Review the <credentials_debug> section of the ECC queue payload to
troubleshoot issues with credentials.
Certain probes support credential debugging. Credential debugging inserts a
<credentials_debug> section in the payload that the MID Server
returns to the instance ECC queue. You can view the <credentials_debug>
section to see detailed information about the credential lookup.
The
<credentials_debug> section appears in the payload if:
You set the credentials_debug parameter to
true for the WMIRunner, PowerShell, or SSHCommand probes. If
you set the parameter to true, the <credentials_debug> section
appears even if the credential lookup is successful.
The <credentials_debug> section shows:
Information about the credential search, such as the credential types, tags, and
affinities.
The IP address targeted.
Information about each credential (in order) that the MID Server used, including the
type, classification, tag, name, Sys ID, and external credential ID if present.
If the credential search was skipped because the target IP is excluded.
If the target IP was added to the exclusion list.
Note: The MID Server saves IP addresses for failed credential searches in an exclusion list
in cache memory. This exclusion list specifies which devices the MID Server should stop
trying to access. IP addresses are added to the exclusion list after every credential has
failed. The IP addresses are cleared from the exclusion list cache either after five
minutes, if the MID Server is restarted, or if the credential records on the instance are
updated.
We use cookies on this site to improve your browsing experience, analyze individualized usage and website traffic, tailor content to your preferences, and make your interactions with our website more meaningful. To learn more about the cookies we use and how you can change your preferences, please read our Cookie Policy and visit our Cookie Preference Manager. By clicking “Accept and Proceed,” closing this banner or continuing to browse this site, you consent to the use of cookies.