+

Search Tips   |   Advanced Search

Operating Systems: AIX, HP-UX, Linux, Solaris, Windows

 

Installing the Secure Shell public key to access your remote workstations


To use Secure Shell (SSH) public/private key as an authentication method for accessing your remote workstations, first install the public key of a public/private key pair on installation targets. You can then securely connect to the remote workstation by using the corresponding private key. Use this topic to install the SSH public key on one or more installation targets.

 

Before you begin

To successfully complete this task, have SSH installed and enabled on the installation target. First create a pair of keys, and install the public key on all the installation targets. Issue the following command to ensure that SSH is started on the workstation:
ps -e | grep sshd

Additionally, know the location of the SSH public key file on the deployment manager, and the administrative ID and password for the installation target. This is the same administrative ID and password that you use to later install or uninstall software packages on the same installation target.

 

About this task

AIX, HP-UX, Solaris, and Linux operating systems generally support the use of SSH protocol. For Windows operating systems, however, you might have to install a third-party software to use SSH protocol. See Use the Secure Shell authentication method on target Windows operating systems for more information.

With the centralized installation manager, you can install product packages and maintenance for distributed platforms directly from the administrative console. Complete the steps that are outlined in the wizard to install the SSH public key, which uses SSH protocol to communicate with the installation targets.

 

Procedure

  1. To access the wizard from the administrative console, click System administration > Centralized Installation Manager > Installation targets.

  2. Select one or more existing installation targets from the table, and click Install SSH Public Key.

  3. Select the appropriate password settings, and click Next. You can either select to specify the same user name and password to access all of the installation targets, or you can configure individual user names and passwords for each installation target.

  4. Specify the location of the SSH public key file on the deployment manager, and click Next.

  5. Review the summary of your selections, and click Finish to complete the installation process. Click Previous to change any of your selections.

 

Results

You successfully installed the SSH public key on specific installation targets.

 

What to do next

You can install the same SSH public key on other installation targets to securely access all of your workstations.



Subtopics

Use the Secure Shell authentication method on target Windows operating systems

 

Related concepts


Requirements for using Remote Execution and Access

 

Related tasks


Installing packages
Uninstall packages
Manage installation targets

 

Related reference


Centralized installation manager administrative tasks