Previous Topic: Generate Keys and Copy the Public Key to the Restore PointNext Topic: Example: Configure Authentication From a Storage Server to a Reporting Server


Prepare the Public Key File for Use

You create the .ssh directory on the restore point server and set ownership to caelmservice. Then, you copy authorized_keys from the /tmp directory to the .ssh directory. Last, you set ownership and permissions on the public key file.

To prepare the public key on the restore point server for non-interactive authentication

  1. Log into the restore point CA User Activity Reporting Module server through ssh as caelmadmin.
  2. Switch users to root.
  3. Change directories to the CA Enterprise Log Manager directory.
    cd /opt/CA/LogManager
    
  4. Create the .ssh directory:
    mkdir .ssh
    
  5. Change the ownership of .ssh to the caelmservice user and group:
    chown caelmservice:caelmservice .ssh
    
  6. Change directories to /opt/CA/LogManager/.ssh.
  7. Copy the authorized_keys file from /tmp to .ssh:
    cp /tmp/authorized_keys .
    
  8. Change ownership of the authorized_keys file to caelmservice:
    chown caelmservice:caelmservice authorized_keys
    
  9. Change permissions on the authorized_keys file:
    chmod 755 authorized_keys