Previous Topic: Configuring Non-Interactive Authentication for RestoreNext Topic: Generate Keys and Copy the Public Key to the Restore Point


Example: Configure Authentication From Remote Storage to a Restore Point

Dedicating a CA User Activity Reporting Module server to use as a restore point makes setting up non-interactive authentication easy. Once you set up authentication between the remote store server and the restore point, you can use the restore-ca-elm.sh script for every restore without any additional steps for authentication.

The process for configuring non-interactive authentication from a storage server to a restore point CA User Activity Reporting Module involves the following procedures:

  1. From the remote storage server, generate the RSA public/private key pair. Copy the public key as authorized_keys to the /tmp directory on the restore point.
  2. From the restore point, create the .ssh directory in /opt/CA/LogManager and set ownership to caelmservice. Copy authorized_keys from the /tmp directory to the .ssh directory. Change ownership and set permissions on authorized_keys.
  3. Validate successful non-interactive authentication between the remote storage server and the restore point.

More information:

Generate Keys and Copy the Public Key to the Restore Point

Prepare the Public Key File for Use