User's Manual
Using the RACADM Command Line Interface 83
Using RACADM to Configure Public Key
Authentication over SSH
Before You Begin
You can configure up to 6 public keys that can be used with the service
username over SSH interface. Before adding or deleting public keys, be sure
to use the view command to see what keys are already set up so a key is not
accidentally overwritten or deleted. The service username is a special user
account that can be used when accessing the CMC through SSH. When the
PKA over SSH is set up and used correctly, you will not have to enter
username or passwords when logging into the CMC. This can be very useful
for setting up automated scripts to perform various functions.
When getting ready to set up this functionality, be aware of the following:
• there is no GUI support for managing this feature; you can only use
RACADM
• when adding new public keys, ensure that the existing keys are not already
at the index where the new key is added. CMC does not perform checks to
ensure previous keys are deleted before a new one is added. As soon as a
new key is added, it is automatically in effect as long as the SSH interface
is enabled.
• when using the public key comment section of the public key, remember
that only the first 16 characters are utilized by the CMC. The public key
comment is used by the CMC to distinguish SSH users when using the
RACADM
getssninfo
command since all PKA users use the service
username to log in.
For example, if two public keys are set up one with comment PC1 and one
with comment PC2:
racadm getssninfo
Type User IP Address Login Date/Time
SSH PC1 x.x.x.x 06/16/2009 09:00:00
SSH PC2 x.x.x.x 06/16/2009 09:00:00
For more information on the
sshpkauth
, see the
Dell Chassis
Management Controller Administrator Reference Guide
.