SlideShare a Scribd company logo
1 of 3
Adding and Using Credentials
Active Directory Health Profiler supports executing Health Profiles/Health Packs underdifferent
credentials. Once credentials are added, you can select a credential before executing Health
Profile/Health Packs.
By John Admin
By default, ActiveDirectory Health Profiler executes Health Profiles or Health Packs under the “Locally
Logged On Credential”. Ifyou wish to execute Health Profiles/Health Packs under differentcredentials,
you need to ensurethat you have added credentials to Active Directory Health Profiler. Once credentials
are added, youcan select a credential beforeexecuting a Health Profile or a Health Pack.
To add credential to Active Directory Health Profiler, click on the “Add Credentials” button as shown in
the screenshot below.
Next, enter the usernamein “DomainName.comusername” format
And user password.
In case you need to add multiple credentials, please repeat above steps.
Using Credential:
To executea Health Profile or a Health Pack under different credential, follow below steps:
1. Select Health Profile or Health Pack.
2. Select the credential as shown in the red circle ofthe below screenshot
3. Right Click on the Health Profile/Health Pack and then click o n the “Execute” action to execute
Health Profile/Health Pack under the selected credential.
Note:Active Directory Health Profiler stores credentials in an encryptedfile that is stored in .DPConfig
folder.
***

More Related Content

Viewers also liked

How to install SQLSERVER 2012
How to install SQLSERVER 2012How to install SQLSERVER 2012
How to install SQLSERVER 2012
Andre Nascimento
 
Active directory
Active directory Active directory
Active directory
deshvikas
 
Chapter 4 configuring and managing the dns server role
Chapter 4   configuring and managing the dns server roleChapter 4   configuring and managing the dns server role
Chapter 4 configuring and managing the dns server role
Luis Garay
 
Windows Server 2008 R2 Overview
Windows Server 2008 R2 OverviewWindows Server 2008 R2 Overview
Windows Server 2008 R2 Overview
Alexander Schek
 

Viewers also liked (13)

windows server 2008 active directory recovery step by step
windows server 2008 active directory recovery step by stepwindows server 2008 active directory recovery step by step
windows server 2008 active directory recovery step by step
 
How to install SQLSERVER 2012
How to install SQLSERVER 2012How to install SQLSERVER 2012
How to install SQLSERVER 2012
 
17 roles of window server 2008 r2
17 roles of window server 2008 r217 roles of window server 2008 r2
17 roles of window server 2008 r2
 
Active directory
Active directory Active directory
Active directory
 
Install Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-StepInstall Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-Step
 
Domain Name Server
Domain Name ServerDomain Name Server
Domain Name Server
 
Chapter 4 configuring and managing the dns server role
Chapter 4   configuring and managing the dns server roleChapter 4   configuring and managing the dns server role
Chapter 4 configuring and managing the dns server role
 
Active Directory
Active Directory Active Directory
Active Directory
 
Windows Server 2008 R2 Overview
Windows Server 2008 R2 OverviewWindows Server 2008 R2 Overview
Windows Server 2008 R2 Overview
 
Windows Server 2008 Active Directory
Windows Server 2008 Active DirectoryWindows Server 2008 Active Directory
Windows Server 2008 Active Directory
 
Install Windows Server 2008 Step-by-Step
Install Windows Server 2008 Step-by-StepInstall Windows Server 2008 Step-by-Step
Install Windows Server 2008 Step-by-Step
 
Step by Step Installation of Microsoft SQL Server 2012
Step by Step Installation of Microsoft SQL Server 2012 Step by Step Installation of Microsoft SQL Server 2012
Step by Step Installation of Microsoft SQL Server 2012
 
Active Directory Training
Active Directory TrainingActive Directory Training
Active Directory Training
 

Similar to Adding credentials

Authorization Module
Authorization ModuleAuthorization Module
Authorization Module
autisimclinic
 
Admin guide knowled base_tracker 1.1
Admin guide  knowled base_tracker 1.1Admin guide  knowled base_tracker 1.1
Admin guide knowled base_tracker 1.1
Gayatri Khosla
 
ReconnectionCertificate
ReconnectionCertificateReconnectionCertificate
ReconnectionCertificate
Ivan Mirkovic
 

Similar to Adding credentials (9)

Adding and configuring health packs
Adding and configuring health packsAdding and configuring health packs
Adding and configuring health packs
 
How to execute individual health pack
How to execute individual health packHow to execute individual health pack
How to execute individual health pack
 
Creating and using health set
Creating and using health setCreating and using health set
Creating and using health set
 
Authorization Module
Authorization ModuleAuthorization Module
Authorization Module
 
Admin guide knowled base_tracker 1.1
Admin guide  knowled base_tracker 1.1Admin guide  knowled base_tracker 1.1
Admin guide knowled base_tracker 1.1
 
Healthcare Dashboards: 3 Keys for Creating Effective and Insightful Executive...
Healthcare Dashboards: 3 Keys for Creating Effective and Insightful Executive...Healthcare Dashboards: 3 Keys for Creating Effective and Insightful Executive...
Healthcare Dashboards: 3 Keys for Creating Effective and Insightful Executive...
 
Generating reports
Generating reportsGenerating reports
Generating reports
 
ReconnectionCertificate
ReconnectionCertificateReconnectionCertificate
ReconnectionCertificate
 
Wellness webinar october 2013
Wellness webinar october 2013Wellness webinar october 2013
Wellness webinar october 2013
 

Recently uploaded

Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
Overkill Security
 

Recently uploaded (20)

How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 

Adding credentials

  • 1. Adding and Using Credentials Active Directory Health Profiler supports executing Health Profiles/Health Packs underdifferent credentials. Once credentials are added, you can select a credential before executing Health Profile/Health Packs. By John Admin By default, ActiveDirectory Health Profiler executes Health Profiles or Health Packs under the “Locally Logged On Credential”. Ifyou wish to execute Health Profiles/Health Packs under differentcredentials, you need to ensurethat you have added credentials to Active Directory Health Profiler. Once credentials are added, youcan select a credential beforeexecuting a Health Profile or a Health Pack. To add credential to Active Directory Health Profiler, click on the “Add Credentials” button as shown in the screenshot below. Next, enter the usernamein “DomainName.comusername” format
  • 2. And user password. In case you need to add multiple credentials, please repeat above steps. Using Credential: To executea Health Profile or a Health Pack under different credential, follow below steps: 1. Select Health Profile or Health Pack. 2. Select the credential as shown in the red circle ofthe below screenshot 3. Right Click on the Health Profile/Health Pack and then click o n the “Execute” action to execute Health Profile/Health Pack under the selected credential.
  • 3. Note:Active Directory Health Profiler stores credentials in an encryptedfile that is stored in .DPConfig folder. ***