Administration Guide › Log Storage › Configuring Non-Interactive Authentication for Restore › Example: Configure Authentication From Remote Storage to a Restore Point
Example: Configure Authentication From Remote Storage to a Restore Point
Dedicating a CA Enterprise Log Manager server to use as a restore point makes setting up non-interactive authentication easy. Once you set up authentication between the remote store server and the restore point, you can use the restore-ca-elm.sh script for every restore without any additional steps for authentication.
The process for configuring non-interactive authentication from a storage server to a restore point CA Enterprise Log Manager involves the following procedures:
- From the remote storage server, generate the RSA public/private key pair. Copy the public key as authorized_keys to the /tmp directory on the restore point.
- From the restore point, create the .ssh directory in /opt/CA/LogManager and set ownership to caelmservice. Copy authorized_keys from the /tmp directory to the .ssh directory. Change ownership and set permissions on authorized_keys.
- Validate successful non-interactive authentication between the remote storage server and the restore point.
More information:
Generate Keys and Copy the Public Key to the Restore Point
Prepare the Public Key File for Use