User's Manual

Using the RACADM Command Line Interface 89
To verify that the user was added successfully with the correct privileges, type
the following command:
racadm getconfig –g cfgUserAdmin –i 2
Using RACADM to Configure Public Key
Authentication over SSH
Before You Begin
You can configure up to 6 public keys that can be used with the service
username over SSH interface. Before adding or deleting public keys, be sure
to use the view command to see what keys are already set up so a key is not
accidentally overwritten or deleted. The service username is a special user
account that can be used when accessing the CMC through SSH. When the
PKA over SSH is set up and used correctly, you need not enter username or
passwords to log in to the CMC. This can be very useful to set up automated
scripts to perform various functions.
When getting ready to set up this functionality, be aware of the following:
there is no GUI support for managing this feature; you can only use
RACADM
when adding new public keys, ensure that the existing keys are not already
at the index where the new key is added. CMC does not perform checks to
ensure previous keys are deleted before a new one is added. As soon as a
new key is added, it is automatically in effect as long as the SSH interface
is enabled.
when using the public key comment section of the public key, remember
that only the first 16 characters are utilized by the CMC. The public key
comment is used by the CMC to distinguish SSH users when using the
RACADM
getssninfo
command since all PKA users use the service
username to log in.