Required SSH Permissions

When monitoring the database host, Database Visibility uses SSH on Linux and Windows systems to gather system information. SSH access can be through either an authenticated username/password or a private key.

You can create an SSH key using the same procedure as described for the Controller. See Configure a Controller SSH Key.