HP BL10e HP ProLiant BL e-Class Integrated Administrator User Guide - Page 175

Key-Based SSH Authentication

Page 175 highlights

Performing Advanced Functions If your ftp server does not support anonymous connections, you can specify a username and password by replacing the host part in the previous format: username:password@host Key-Based SSH Authentication Users may install their own public SSH keys for password-less logins to the Integrated Administrators. Only enclosure administrators can use key-based authentication. The CLI features four commands to install and manage the authorized SSH keys. To view any current installed authorized SSH keys, enter: SHOW SSHKEY This command will show any keys currently installed on the Integrated Administrator that are authorized to log in using an enclosure administrator account. To view the fingerprint of the Integrated Administrator host key, enter: SHOW SSHFINGERPRINT This command will show the fingerprint of the host key for the Integrated Administrators. Users may compare this fingerprint with the fingerprint displayed by their SSH client when connecting to the Integrated Administrators to guarantee the authenticity of the Integrated Administrator connection. Users who need guaranteed authenticity will want to use the Integrated Administrator serial console to obtain the SSH fingerprint for the first time. To clear any currently installed authorized SSH keys, enter: CLEAR SSHKEY This command will clear any authorized keys currently installed on the Integrated Administrator that are authorized to log in. After this command has been issued, all users have to enter a valid password in order to log in. HP ProLiant BL e-Class Integrated Administrator User Guide 7-5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228

Performing Advanced Functions
If your ftp server does not support anonymous connections, you can specify a
username and password by replacing the host part in the previous format:
username:password@host
Key-Based SSH Authentication
Users may install their own public SSH keys for password-less logins to the
Integrated Administrators. Only enclosure administrators can use key-based
authentication. The CLI features four commands to install and manage the authorized
SSH keys.
To view any current installed authorized SSH keys, enter:
SHOW SSHKEY
This command will show any keys currently installed on the Integrated Administrator
that are authorized to log in using an enclosure administrator account.
To view the fingerprint of the Integrated Administrator host key, enter:
SHOW SSHFINGERPRINT
This command will show the fingerprint of the host key for the Integrated
Administrators. Users may compare this fingerprint with the fingerprint displayed by
their SSH client when connecting to the Integrated Administrators to guarantee the
authenticity of the Integrated Administrator connection. Users who need guaranteed
authenticity will want to use the Integrated Administrator serial console to obtain the
SSH fingerprint for the first time.
To clear any currently installed authorized SSH keys, enter:
CLEAR SSHKEY
This command will clear any authorized keys currently installed on the Integrated
Administrator that are authorized to log in. After this command has been issued, all
users have to enter a valid password in order to log in.
HP ProLiant BL e-Class Integrated Administrator User Guide
7-5