Key-based ssh authentication, Key-based ssh authentication -5 – HP ProLiant BL10e G2 Server Blade User Manual

Page 178

Advertising
background image

Performing Advanced Functions

If your ftp server does not support anonymous connections, you can specify a
username and password by replacing the host part in the previous format:

username:password@host

Key-Based SSH Authentication

Users may install their own public SSH keys for password-less logins to the
Integrated Administrators. Only enclosure administrators can use key-based
authentication. The CLI features four commands to install and manage the authorized
SSH keys.

To view any current installed authorized SSH keys, enter:

SHOW SSHKEY

This command will show any keys currently installed on the Integrated Administrator
that are authorized to log in using an enclosure administrator account.

To view the fingerprint of the Integrated Administrator host key, enter:

SHOW SSHFINGERPRINT

This command will show the fingerprint of the host key for the Integrated
Administrators. Users may compare this fingerprint with the fingerprint displayed by
their SSH client when connecting to the Integrated Administrators to guarantee the
authenticity of the Integrated Administrator connection. Users who need guaranteed
authenticity will want to use the Integrated Administrator serial console to obtain the
SSH fingerprint for the first time.

To clear any currently installed authorized SSH keys, enter:

CLEAR SSHKEY

This command will clear any authorized keys currently installed on the Integrated
Administrator that are authorized to log in. After this command has been issued, all
users have to enter a valid password in order to log in.

HP ProLiant BL e-Class Integrated Administrator User Guide

7-5

HP CONFIDENTIAL

Writer: Hilary Stead File Name: h-ch7 Performing Advanced Functions.doc

Codename: Halo Part Number: 249070-005 Last Saved On: 3/1/04 10:54 AM

Advertising
This manual is related to the following products: