Proxy touchpoints can be created by configuring an existing touchpoint to run as a proxy touchpoint for a remote computer or other device. A touchpoint can be configured as a proxy touchpoint for a host with either a UNIX or a Windows operating environment. Proxy touchpoints use SSH to execute actions on target computers.
Proxy touchpoint usage prerequisites follow:
Important! If you do this step, be sure to adhere to guidelines documented in CA Process Automation-Specific Requirements for SSH Connectivity.
Copyright © 2014 CA.
All rights reserved.
|
|