

Implementation Guide › Configuring Services › Configuring the Event Log Store › Example: Configure Non-Interactive Authentication for Hub and Spoke › Configure Keys for the Reporting-Remote Storage Pair
Configure Keys for the Reporting-Remote Storage Pair
After you configure and validate non-interactive authentication from each collection server to the reporting server, you configure and validate non-interactive authentication from the reporting server to the remote storage server.
For the example scenario, configuration begins with generating a new RSA key pair on the reporting server, ELM-RPT, and copying the public key as authorized_keys to the /tmp directory of the remote storage server, RSS.
To generate an RSA key pair on the reporting server and copy it to the remote storage server
- Log into the reporting server as caelmadmin.
- Switch users to root.
- Switch users to the caelmservice account.
su - caelmservice
- Generate the RSA key pair using the following command:
ssh-keygen -t rsa
- Press Enter to accept the default when each of the following prompts appears:
- Enter file in which to save the key (/opt/CA/LogManager/.ssh/id_rsa):
- Enter passphrase (empty for no passphrase):
- Enter same passphrase again:
- Change directories to opt/CA/LogManager.
- Change the permissions of the .ssh directory using the following command:
chmod 755 .ssh
- Navigate to the .ssh folder.
- Copy the id_rsa.pub file to RSS, the destination remote storage server, using the following command:
scp id_rsa.pub caelmadmin@RSS:/tmp/authorized_keys
This creates the authorized_keys file in the /tmp directory on the remote storage server with the content of the public key.
Copyright © 2013 CA.
All rights reserved.
 
|
|