Required SSH Permissions
When monitoring the database host, Database Visibility uses SSH on Linux and Windows systems to gather system information. SSH access can be through either an authenticated username/password or a private key.
You can create an SSH key using the same procedure as described for the Controller. See Configure a Controller SSH Key.