To specify the hosts that are participating in the process control system, you must define the process agent host names in the process agent configuration file.
Each host entry defines the name of the host (for example, sfosys1) and the name of the process agent to be used in the process control system (for example, SFOSYS1_PA). For each host definition, you can also specify user name and password credentials for connecting to the process agent.
An example routing definition in the $NCHOME/omnibus/etc/nco_pa.conf configuration file is as follows:
nco_routing
{
host 'sfosys1' 'SFOSYS1_PA' 'username' 'password'
host 'sfosys2' 'SFOSYS2_PA' 'username' 'password'
}
If the process agent is using UNIX authentication (the default on UNIX), the username must be an operating system user that is a member of the ncoadmin group (default) or any other administrative group that is created for granting access to the process control system. A process agent daemon that is running in secure mode must be run by the root user.
On Windows, username must be the user name of a valid local account, domain account, or UPN account.
When running the process agent daemon nco_pad, you can also specify the user name and password by using the -user and -password command-line options. This overrides any entries in the nco_pa.conf configuration file.
You can encrypt plain text login passwords that are stored in the nco_pa.conf file.
Password encryption details for running in FIPS 140–2 mode and non-FIPS 140–2 mode are described in the following table.
| Mode | Action |
|---|---|
| FIPS 140–2 mode | When in FIPS 140–2 mode, passwords can either be specified in plain text or in encrypted format. You can encrypt passwords by using property value encryption, as follows:
|
| Non-FIPS 140–2 mode | In non-FIPS 140–2 mode, you can either use the nco_pa_crypt utility or use property value encryption to encrypt plain text login passwords on UNIX. On Windows, you can use the nco_g_crypt utility or use property value encryption. Perform either of the following actions:
|
Passwords that are encrypted using nco_pa_crypt are decrypted by the remote process control agent.
Passwords that are encrypted using nco_aes_crypt are decrypted by the process agent daemon, and are passed to remote process agents as plain text. To decrypt the passwords, you must set the -cryptalgorithm and -keyfile command-line options when running nco_pad. These options specify which algorithm and key file to use for decryption.