Owner's Manual

Using the RACADM Command Line Interface 93
Using RACADM to Configure Public Key
Authentication over SSH
You can configure up to 6 public keys that can be used with the service
username over SSH interface. Before adding or deleting public keys, be sure
to use the view command to see what keys are already set up so a key is not
accidentally overwritten or deleted. The service username is a special user
account that can be used when accessing the CMC through SSH. When the
PKA over SSH is set up and used correctly, you need not enter username or
passwords to log in to the CMC. This can be very useful to set up automated
scripts to perform various functions.
When getting ready to set up this functionality, be aware of the following:
There is no GUI support for managing this feature; you can only use
RACADM.
When adding new public keys, ensure that the existing keys are not already
at the index where the new key is added. CMC does not perform checks to
ensure previous keys are deleted before a new one is added. As soon as a
new key is added, it is automatically in effect as long as the SSH interface
is enabled.
When using the public key comment section of the public key, remember
that only the first 16 characters are utilized by the CMC. The public key
comment is used by the CMC to distinguish SSH users when using the
RACADM
getssninfo
command since all PKA users use the service
username to log in.
For example, if two public keys are set up one with comment PC1 and one
with comment PC2:
racadm getssninfo
Type User IP Address Login
Date/Time
SSH PC1 x.x.x.x 06/16/2009
09:00:00
SSH PC2 x.x.x.x 06/16/2009
09:00:00
For more information on the sshpkauth, see the RACADM Command Line
Reference Guide for iDRAC6 and CMC.