Dell PowerEdge FX2 Dell PowerEdge FX2 and FX2s Enclosure Owners Manual - Page 80

lPHmUv5Mn55Ea6LHUslAXFqXmOdlThd, AAAAB3NzaC1yc2EAAAABIwAAAIEAzzy

Page 80 highlights

Synopsis Input The delete mode allows the user to delete a key specified by the user or all keys. racadm sshpkauth -i -d -k racadm sshpkauth -i -d -k all racadm sshpkauth NOTE: For DSA keys greater than 2048, use the following racadm command. CMC accepts RSA keys up to key strength 4096, but the recommended key strength is 1024. racadm -r 192.168.8.14 -u root -p sshpkauth -i svcacct -k 1 -p 0xfff -f dsa_2048.pub • -i < user index > - Index for the user. must be between 2 and 16 on iDRAC. • -k [< key index > | all] - Index to assign the PK key being uploaded. all only works with the -v or -d options. must be between 1 and 4 or all on iDRAC. • -t < PK Key Text > - Key text for the SSH Public key. • -f < filename > - File containing the key text to upload. The -f option is not supported on Telnet/ssh/serial RACADM. • -v - View the key text for the index provided. • -d - Delete the key for the index provided. Examples : • Upload an invalid key to iDRAC User 2 in the first key space using a string: $ racadm sshpkauth -i 2 -k 1 -t "This is invalid key Text" ERROR: Key text appears to be corrupt • Upload a valid key to iDRAC User 2 in the first key space using a file: $ racadm sshpkauth -i 2 -k 1 -f pkkey.key Key file successfully uploaded. • Get all keys for User 2 on iDRAC: $ racadm sshpkauth -v -i 2 -k all User ID 2 Key ID 1: ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEAzzy +k2npnKqVEXGXIzo0sbR6JgA5YNbWs3ekoxXV fe3yJVpVc/5zrrr7XrwKbJAJTqSw8Dg3iR4n3vUaP +lPHmUv5Mn55Ea6LHUslAXFqXmOdlThd 80

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142

The delete mode allows the user to delete a key specified by the user or all
keys.
racadm sshpkauth -i <
2 to 16
> -d -k <
1 to 4
>
racadm sshpkauth -i <
2 to 16
> -d -k all
Synopsis
racadm sshpkauth
NOTE:
For DSA keys greater than 2048, use the following racadm command. CMC
accepts RSA keys up to key strength 4096, but the recommended key
strength is 1024.
racadm -r 192.168.8.14 -u root -p <default root user
password> sshpkauth -i svcacct -k 1 -p 0xfff -f
dsa_2048.pub
Input
-i
<
user index
> - Index for the user. <
user index
> must be between 2
and 16 on iDRAC.
-k
[<
key index
> | all] - Index to assign the PK key being uploaded.
all
only works with the -v or -d options. <
key index
> must be between 1 and
4 or
all
on iDRAC.
-t
<
PK Key Text
> - Key text for the SSH Public key.
-f
<
filename
> - File containing the key text to upload. The -f option is
not supported on Telnet/ssh/serial RACADM.
-v
- View the key text for the index provided.
-d
- Delete the key for the index provided.
Examples
:
Upload an invalid key to iDRAC User 2 in the first key space using a string:
$ racadm sshpkauth -i 2 -k 1 -t "This is invalid key
Text"
ERROR: Key text appears to be corrupt
Upload a valid key to iDRAC User 2 in the first key space using a file:
$ racadm sshpkauth -i 2 -k 1 -f pkkey.key
Key file successfully uploaded.
Get all keys for User 2 on iDRAC:
$ racadm sshpkauth -v -i 2 -k all
********************* User ID 2 ******************
Key ID 1:
ssh-rsa
AAAAB3NzaC1yc2EAAAABIwAAAIEAzzy
+k2npnKqVEXGXIzo0sbR6JgA5YNbWs3ekoxXV
fe3yJVpVc/5zrrr7XrwKbJAJTqSw8Dg3iR4n3vUaP
+lPHmUv5Mn55Ea6LHUslAXFqXmOdlThd
80