Administration Guide › Log Storage › Configuring Non-Interactive Authentication for Restore › Example: Configure Authentication From a Storage Server to a Reporting Server › Generate Keys and Copy the Public Key to a Reporting Server
Generate Keys and Copy the Public Key to a Reporting Server
From the remote storage server, generate an RSA key pair as the caelmservice user and then copy the public key as authorized_keys_RSS to the /tmp directory on a reporting CA User Activity Reporting Module server. The reporting server typically has an authorized_keys file in the .ssh directory that contains a concatenation of public keys from various collection servers. Send the key with a unique name so that it can be appended to the existing authorized_keys file.
To generate the RSA public/private key pair and copy the public key from the remote storage to a reporting server
- Log on to the remote storage server through ssh as the caelmadmin user.
- Switch users to root.
- Switch users to the caelmservice account.
su - caelmservice
- Generate an RSA key pair as the caelmservice user.
ssh-keygen -t rsa
- Press Enter to accept the default when each of the following prompts appears:
- Enter file in which to save the key (/opt/CA/LogManager/.ssh/id_rsa):
- Enter passphrase (empty for no passphrase):
- Enter same passphrase again:
- Change the permissions of the .ssh directory using the following command:
chmod 755 .ssh
- Navigate to the .ssh directory.
- Copy id_rsa.pub as authorized_keys_RSS to the /tmp directory on the reporting server.
scp id_rsa.pub caelmadmin@<reporting_server>:/tmp/authorized_keys_RSS
Copyright © 2013 CA.
All rights reserved.
|
|