Reference record for OID 1.3.6.1.6.3.15.1.2.2.1.6



parent
1.3.6.1.6.3.15.1.2.2.1 (usmUserEntry)
node code
6
node name
usmUserAuthKeyChange
dot oid
1.3.6.1.6.3.15.1.2.2.1.6
type
OBJECT-TYPE
asn1 oid
  • {iso(1) identified-organization(3) dod(6) internet(1) snmpV2(6) snmpModules(3) snmpUsmMIB(15) usmMIBObjects(1) usmUser(2) usmUserTable(2) usmUserEntry(1) usmUserAuthKeyChange(6)}
  • {iso(1) org(3) dod(6) internet(1) snmpV2(6) snmpModules(3) snmpUsmMIB(15) usmMIBObjects(1) usmUser(2) usmUserTable(2) usmUserEntry(1) usmUserAuthKeyChange(6)}
  • {iso(1) iso-identified-organization(3) dod(6) internet(1) snmpV2(6) snmpModules(3) snmpUsmMIB(15) usmMIBObjects(1) usmUser(2) usmUserTable(2) usmUserEntry(1) usmUserAuthKeyChange(6)}
  • iri oid
  • /iso/identified-organization/dod/internet/snmpV2/snmpModules/snmpUsmMIB/usmMIBObjects/usmUser/usmUserTable/usmUserEntry/usmUserAuthKeyChange
  • /iso/org/dod/internet/snmpV2/snmpModules/snmpUsmMIB/usmMIBObjects/usmUser/usmUserTable/usmUserEntry/usmUserAuthKeyChange
  • /iso/iso-identified-organization/dod/internet/snmpV2/snmpModules/snmpUsmMIB/usmMIBObjects/usmUser/usmUserTable/usmUserEntry/usmUserAuthKeyChange
  • iri by oid_info
    /ISO/Identified-Organization/6/1/6/3/15/1/2/2/1/6

    Description by circitor

    An object, which when modified, causes the secret
    authentication key used for messages sent on behalf
    of this user to/from the SNMP engine identified by
    usmUserEngineID, to be modified via a one-way
    function.

    The associated protocol is the usmUserAuthProtocol.
    The associated secret key is the user's secret
    authentication key (authKey). The associated hash
    algorithm is the algorithm used by the user's
    usmUserAuthProtocol.

    When creating a new user, it is an 'inconsistentName'
    error for a set operation to refer to this object
    unless it is previously or concurrently initialized
    through a set operation on the corresponding instance
    of usmUserCloneFrom.

    When the value of the corresponding usmUserAuthProtocol
    is usmNoAuthProtocol, then a set is successful, but
    effectively is a no-op.

    When this object is read, the zero-length (empty)
    string is returned.

    The recommended way to do a key change is as follows:


    1) GET(usmUserSpinLock.0) and save in sValue.
    2) generate the keyChange value based on the old
    (existing) secret key and the new secret key,
    let us call this kcValue.

    If you do the key change on behalf of another user:

    3) SET(usmUserSpinLock.0=sValue,
    usmUserAuthKeyChange=kcValue
    usmUserPublic=randomValue)

    If you do the key change for yourself:

    4) SET(usmUserSpinLock.0=sValue,
    usmUserOwnAuthKeyChange=kcValue
    usmUserPublic=randomValue)

    If you get a response with error-status of noError,
    then the SET succeeded and the new key is active.
    If you do not get a response, then you can issue a
    GET(usmUserPublic) and check if the value is equal
    to the randomValue you did send in the SET. If so, then
    the key change succeeded and the new key is active
    (probably the response got lost). If not, then the SET
    request probably never reached the target and so you
    can start over with the procedure above.

    Parsed from file SNMP-USER-BASED-SM-MIB.mib
    Module: SNMP-USER-BASED-SM-MIB

    Description by cisco_v1

    An object, which when modified, causes the secret
    authentication key used for messages sent on behalf
    of this user to/from the SNMP engine identified by
    usmUserEngineID, to be modified via a one-way
    function.

    The associated protocol is the usmUserAuthProtocol.
    The associated secret key is the user's secret
    authentication key (authKey). The associated hash
    algorithm is the algorithm used by the user's
    usmUserAuthProtocol.

    When creating a new user, it is an 'inconsistentName'
    error for a set operation to refer to this object
    unless it is previously or concurrently initialized
    through a set operation on the corresponding instance
    of usmUserCloneFrom.

    When the value of the corresponding usmUserAuthProtocol
    is usmNoAuthProtocol, then a set is successful, but
    effectively is a no-op.

    When this object is read, the zero-length (empty)
    string is returned.

    The recommended way to do a key change is as follows:

    1) GET(usmUserSpinLock.0) and save in sValue.
    2) generate the keyChange value based on the old
    (existing) secret key and the new secret key,
    let us call this kcValue.

    If you do the key change on behalf of another user:

    3) SET(usmUserSpinLock.0=sValue,
    usmUserAuthKeyChange=kcValue
    usmUserPublic=randomValue)

    If you do the key change for yourself:

    4) SET(usmUserSpinLock.0=sValue,
    usmUserOwnAuthKeyChange=kcValue
    usmUserPublic=randomValue)

    If you get a response with error-status of noError,
    then the SET succeeded and the new key is active.
    If you do not get a response, then you can issue a
    GET(usmUserPublic) and check if the value is equal





    to the randomValue you did send in the SET. If so, then
    the key change succeeded and the new key is active
    (probably the response got lost). If not, then the SET
    request probably never reached the target and so you
    can start over with the procedure above.

    Description by oid_info

    usmUserAuthKeyChange OBJECT-TYPE
    SYNTAX KeyChange -- typically (SIZE (0 | 32)) for HMACMD5
    -- typically (SIZE (0 | 40)) for HMACSHA
    MAX-ACCESS read-create
    STATUS current
    DESCRIPTION "An object, which when modified, causes the secret
    authentication key used for messages sent on behalf
    of this user to/from the SNMP engine identified by
    usmUserEngineID, to be modified via a one-way
    function.
    The associated protocol is the usmUserAuthProtocol.
    The associated secret key is the users secret
    authentication key (authKey). The associated hash
    algorithm is the algorithm used by the users
    usmUserAuthProtocol.
    When creating a new user, it is an inconsistentName
    error for a set operation to refer to this object
    unless it is previously or concurrently initialized
    through a set operation on the corresponding instance
    of usmUserCloneFrom.
    When the value of the corresponding usmUserAuthProtocol
    is usmNoAuthProtocol, then a set is successful, but
    effectively is a no-op.
    When this object is read, the zero-length (empty)
    string is returned.
    The recommended way to do a key change is as follows:
    1) GET(usmUserSpinLock.0) and save in sValue.
    2) generate the keyChange value based on the old
    (existing) secret key and the new secret key,
    let us call this kcValue.
    If you do the key change on behalf of another user:
    3) SET(usmUserSpinLock.0=sValue,
    usmUserAuthKeyChange=kcValue
    usmUserPublic=randomValue)
    If you do the key change for yourself:
    4) SET(usmUserSpinLock.0=sValue,
    usmUserOwnAuthKeyChange=kcValue
    usmUserPublic=randomValue)
    If you get a response with error-status of noError,
    then the SET succeeded and the new key is active.
    If you do not get a response, then you can issue a
    GET(usmUserPublic) and check if the value is equal
    to the randomValue you did send in the SET. If so, then
    the key change succeeded and the new key is active
    (probably the response got lost). If not, then the SET
    request probably never reached the target and so you
    can start over with the procedure above.
    "
    DEFVAL { H } -- the empty string

    View at oid-info.com

    Description by mibdepot

    An object, which when modified, causes the secret
    authentication key used for messages sent on behalf
    of this user to/from the SNMP engine identified by
    usmUserEngineID, to be modified via a one-way
    function.

    The associated protocol is the usmUserAuthProtocol.
    The associated secret key is the user's secret
    authentication key (authKey). The associated hash
    algorithm is the algorithm used by the user's
    usmUserAuthProtocol.

    When creating a new user, it is an 'inconsistentName'
    error for a set operation to refer to this object
    unless it is previously or concurrently initialized
    through a set operation on the corresponding instance
    of usmUserCloneFrom.

    When the value of the corresponding usmUserAuthProtocol
    is usmNoAuthProtocol, then a set is successful, but
    effectively is a no-op.

    When this object is read, the zero-length (empty)
    string is returned.

    The recommended way to do a key change is as follows:
    1) GET(usmUserSpinLock.0) and save in sValue.
    2) generate the keyChange value based on the old
    (existing) secret key and the new secret key,
    let us call this kcValue.

    If you do the key change on behalf of another user:

    3) SET(usmUserSpinLock.0=sValue,
    usmUserAuthKeyChange=kcValue
    usmUserPublic=randomValue)

    If you do the key change for yourself:

    4) SET(usmUserSpinLock.0=sValue,
    usmUserOwnAuthKeyChange=kcValue
    usmUserPublic=randomValue)

    If you get a response with error-status of noError,
    then the SET succeeded and the new key is active.
    If you do not get a response, then you can issue a
    GET(usmUserPublic) and check if the value is equal
    to the randomValue you did send in the SET. If so, then
    the key change succeeded and the new key is active
    (probably the response got lost). If not, then the SET
    request probably never reached the target and so you
    can start over with the procedure above.

    Parsed from file rfc3414.mib.txt
    Company: None
    Module: SNMP-USER-BASED-SM-MIB

    Description by cisco

    An object, which when modified, causes the secret
    authentication key used for messages sent on behalf
    of this user to/from the SNMP engine identified by
    usmUserEngineID, to be modified via a one-way
    function.

    The associated protocol is the usmUserAuthProtocol.
    The associated secret key is the user's secret
    authentication key (authKey). The associated hash
    algorithm is the algorithm used by the user's
    usmUserAuthProtocol.

    When creating a new user, it is an 'inconsistentName'
    error for a set operation to refer to this object
    unless it is previously or concurrently initialized
    through a set operation on the corresponding instance
    of usmUserCloneFrom.

    When the value of the corresponding usmUserAuthProtocol
    is usmNoAuthProtocol, then a set is successful, but
    effectively is a no-op.

    When this object is read, the zero-length (empty)
    string is returned.

    The recommended way to do a key change is as follows:

    1) GET(usmUserSpinLock.0) and save in sValue.
    2) generate the keyChange value based on the old
    (existing) secret key and the new secret key,
    let us call this kcValue.

    If you do the key change on behalf of another user:

    3) SET(usmUserSpinLock.0=sValue,
    usmUserAuthKeyChange=kcValue
    usmUserPublic=randomValue)

    If you do the key change for yourself:

    4) SET(usmUserSpinLock.0=sValue,
    usmUserOwnAuthKeyChange=kcValue
    usmUserPublic=randomValue)

    If you get a response with error-status of noError,
    then the SET succeeded and the new key is active.
    If you do not get a response, then you can issue a
    GET(usmUserPublic) and check if the value is equal





    to the randomValue you did send in the SET. If so, then
    the key change succeeded and the new key is active
    (probably the response got lost). If not, then the SET
    request probably never reached the target and so you
    can start over with the procedure above.

    Information by circitor

    usmUserAuthKeyChange OBJECT-TYPE SYNTAX KeyChange MAX-ACCESS read-create STATUS current DESCRIPTION "An object, which when modified, causes the secret authentication key used for messages sent on behalf of this user to/from the SNMP engine identified by usmUserEngineID, to be modified via a one-way function. The associated protocol is the usmUserAuthProtocol. The associated secret key is the user's secret authentication key (authKey). The associated hash algorithm is the algorithm used by the user's usmUserAuthProtocol. When creating a new user, it is an 'inconsistentName' error for a set operation to refer to this object unless it is previously or concurrently initialized through a set operation on the corresponding instance of usmUserCloneFrom. When the value of the corresponding usmUserAuthProtocol is usmNoAuthProtocol, then a set is successful, but effectively is a no-op. When this object is read, the zero-length (empty) string is returned. The recommended way to do a key change is as follows: 1) GET(usmUserSpinLock.0) and save in sValue. 2) generate the keyChange value based on the old (existing) secret key and the new secret key, let us call this kcValue. If you do the key change on behalf of another user: 3) SET(usmUserSpinLock.0=sValue, usmUserAuthKeyChange=kcValue usmUserPublic=randomValue) If you do the key change for yourself: 4) SET(usmUserSpinLock.0=sValue, usmUserOwnAuthKeyChange=kcValue usmUserPublic=randomValue) If you get a response with error-status of noError, then the SET succeeded and the new key is active. If you do not get a response, then you can issue a GET(usmUserPublic) and check if the value is equal to the randomValue you did send in the SET. If so, then the key change succeeded and the new key is active (probably the response got lost). If not, then the SET request probably never reached the target and so you can start over with the procedure above. " DEFVAL { ''H } ::= { usmUserEntry 6 }

    Information by cisco_v1

    usmUserAuthKeyChange OBJECT-TYPE SYNTAX KeyChange ACCESS read-write STATUS mandatory DESCRIPTION "An object, which when modified, causes the secret authentication key used for messages sent on behalf of this user to/from the SNMP engine identified by usmUserEngineID, to be modified via a one-way function. The associated protocol is the usmUserAuthProtocol. The associated secret key is the user's secret authentication key (authKey). The associated hash algorithm is the algorithm used by the user's usmUserAuthProtocol. When creating a new user, it is an 'inconsistentName' error for a set operation to refer to this object unless it is previously or concurrently initialized through a set operation on the corresponding instance of usmUserCloneFrom. When the value of the corresponding usmUserAuthProtocol is usmNoAuthProtocol, then a set is successful, but effectively is a no-op. When this object is read, the zero-length (empty) string is returned. The recommended way to do a key change is as follows: 1) GET(usmUserSpinLock.0) and save in sValue. 2) generate the keyChange value based on the old (existing) secret key and the new secret key, let us call this kcValue. If you do the key change on behalf of another user: 3) SET(usmUserSpinLock.0=sValue, usmUserAuthKeyChange=kcValue usmUserPublic=randomValue) If you do the key change for yourself: 4) SET(usmUserSpinLock.0=sValue, usmUserOwnAuthKeyChange=kcValue usmUserPublic=randomValue) If you get a response with error-status of noError, then the SET succeeded and the new key is active. If you do not get a response, then you can issue a GET(usmUserPublic) and check if the value is equal to the randomValue you did send in the SET. If so, then the key change succeeded and the new key is active (probably the response got lost). If not, then the SET request probably never reached the target and so you can start over with the procedure above." DEFVAL { ''H } ::= { usmUserEntry 6 }

    Information by oid_info

    Automatically extracted from RFC3414

    Information by mibdepot

    usmUserAuthKeyChange OBJECT-TYPE SYNTAX KeyChange MAX-ACCESS read-create STATUS current DESCRIPTION "An object, which when modified, causes the secret authentication key used for messages sent on behalf of this user to/from the SNMP engine identified by usmUserEngineID, to be modified via a one-way function. The associated protocol is the usmUserAuthProtocol. The associated secret key is the user's secret authentication key (authKey). The associated hash algorithm is the algorithm used by the user's usmUserAuthProtocol. When creating a new user, it is an 'inconsistentName' error for a set operation to refer to this object unless it is previously or concurrently initialized through a set operation on the corresponding instance of usmUserCloneFrom. When the value of the corresponding usmUserAuthProtocol is usmNoAuthProtocol, then a set is successful, but effectively is a no-op. When this object is read, the zero-length (empty) string is returned. The recommended way to do a key change is as follows: 1) GET(usmUserSpinLock.0) and save in sValue. 2) generate the keyChange value based on the old (existing) secret key and the new secret key, let us call this kcValue. If you do the key change on behalf of another user: 3) SET(usmUserSpinLock.0=sValue, usmUserAuthKeyChange=kcValue usmUserPublic=randomValue) If you do the key change for yourself: 4) SET(usmUserSpinLock.0=sValue, usmUserOwnAuthKeyChange=kcValue usmUserPublic=randomValue) If you get a response with error-status of noError, then the SET succeeded and the new key is active. If you do not get a response, then you can issue a GET(usmUserPublic) and check if the value is equal to the randomValue you did send in the SET. If so, then the key change succeeded and the new key is active (probably the response got lost). If not, then the SET request probably never reached the target and so you can start over with the procedure above. " DEFVAL { ''H } ::= { usmUserEntry 6 }

    Information by cisco

    usmUserAuthKeyChange OBJECT-TYPE SYNTAX KeyChange MAX-ACCESS read-create STATUS current DESCRIPTION "An object, which when modified, causes the secret authentication key used for messages sent on behalf of this user to/from the SNMP engine identified by usmUserEngineID, to be modified via a one-way function. The associated protocol is the usmUserAuthProtocol. The associated secret key is the user's secret authentication key (authKey). The associated hash algorithm is the algorithm used by the user's usmUserAuthProtocol. When creating a new user, it is an 'inconsistentName' error for a set operation to refer to this object unless it is previously or concurrently initialized through a set operation on the corresponding instance of usmUserCloneFrom. When the value of the corresponding usmUserAuthProtocol is usmNoAuthProtocol, then a set is successful, but effectively is a no-op. When this object is read, the zero-length (empty) string is returned. The recommended way to do a key change is as follows: 1) GET(usmUserSpinLock.0) and save in sValue. 2) generate the keyChange value based on the old (existing) secret key and the new secret key, let us call this kcValue. If you do the key change on behalf of another user: 3) SET(usmUserSpinLock.0=sValue, usmUserAuthKeyChange=kcValue usmUserPublic=randomValue) If you do the key change for yourself: 4) SET(usmUserSpinLock.0=sValue, usmUserOwnAuthKeyChange=kcValue usmUserPublic=randomValue) If you get a response with error-status of noError, then the SET succeeded and the new key is active. If you do not get a response, then you can issue a GET(usmUserPublic) and check if the value is equal to the randomValue you did send in the SET. If so, then the key change succeeded and the new key is active (probably the response got lost). If not, then the SET request probably never reached the target and so you can start over with the procedure above. " DEFVAL { ''H } ::= { usmUserEntry 6 }

    First Registration Authority (recovered by parent 1.3.6)

    Defense Communication Agency

    Current Registration Authority (recovered by parent 1.3.6)

    US DoD

    Brothers (12)

    OIDNameSub childrenSub Nodes TotalDescription
    1.3.6.1.6.3.15.1.2.2.1.1 usmUserEngineID 0 0 An SNMP engine's administratively-unique identifier.

    In a simple agent, this value is always that agent's
    own snmpEngineID value.…
    1.3.6.1.6.3.15.1.2.2.1.2 usmUserName 0 0 A human readable string representing the name of
    the user.

    This is the (User-based Security) Model dependent
    security ID.
    1.3.6.1.6.3.15.1.2.2.1.3 usmUserSecurityName 0 0 A human readable string representing the user in
    Security Model independent format.

    The default transformation of the User-based …
    1.3.6.1.6.3.15.1.2.2.1.4 usmUserCloneFrom 0 0 A pointer to another conceptual row in this
    usmUserTable. The user in this other conceptual
    row is called the clone-from user.

    Wh…
    1.3.6.1.6.3.15.1.2.2.1.5 usmUserAuthProtocol 0 0 An indication of whether messages sent on behalf of
    this user to/from the SNMP engine identified by
    usmUserEngineID, can be authe…
    1.3.6.1.6.3.15.1.2.2.1.7 usmUserOwnAuthKeyChange 0 0 Behaves exactly as usmUserAuthKeyChange, with one
    notable difference: in order for the set operation
    to succeed, the usmUserName …
    1.3.6.1.6.3.15.1.2.2.1.8 usmUserPrivProtocol 0 0 An indication of whether messages sent on behalf of
    this user to/from the SNMP engine identified by
    usmUserEngineID, can be prote…
    1.3.6.1.6.3.15.1.2.2.1.9 usmUserPrivKeyChange 0 0 An object, which when modified, causes the secret
    encryption key used for messages sent on behalf
    of this user to/from the SNMP e…
    1.3.6.1.6.3.15.1.2.2.1.10 usmUserOwnPrivKeyChange 0 0 Behaves exactly as usmUserPrivKeyChange, with one
    notable difference: in order for the Set operation
    to succeed, the usmUserName …
    1.3.6.1.6.3.15.1.2.2.1.11 usmUserPublic 0 0 A publicly-readable value which can be written as part
    of the procedure for changing a user's secret
    authentication and/or privac…
    1.3.6.1.6.3.15.1.2.2.1.12 usmUserStorageType 0 0 The storage type for this conceptual row.

    Conceptual rows having the value 'permanent' must
    allow write-access at a minimum to:

    - …
    1.3.6.1.6.3.15.1.2.2.1.13 usmUserStatus 0 0 The status of this conceptual row.

    Until instances of all corresponding columns are
    appropriately configured, the value of the
    cor…