Reference Guide
NOTE:
• For DSA keys greater than 2048, use the following racadm command:
racadm -r 192.168.8.14 -u root -p calvin sshpkauth -i
svcacct -k 1 -p 0xfff -f dsa_2048.pub
• CMC accepts RSA keys up to key strength 4096, but the recommended key
strength is 1024.
Synopsis
• racadm sshpkauth -i svcacct -k <key_index> -p <privilege> -t
<PK_key_text>
• racadm sshpkauth -i svcacct -k <key_index> -p <privilege> -f
<PK_key_text>
• racadm sshpkauth -v -i svcacct -k all|<key_index>
• racadm sshpkauth -d -i svcacct -k all|<key_index>
Input
• -i <user_index> — Index for the user, it must be svcacct for CMC.
• -k [<key_index> | all] — Index to assign the PK key being uploaded. all only
works with the
-v or -d options. <key_index> must be between 1 to 6 or all on
CMC.
• -p <privilege> — Level to give to user for this PK key.
• -r <cmcIpAddr> — Specifies the controller’s remote IP address.
• -u <username> — Specifies the user name.
• -t <PK_Key_Text> — Key text for the SSH Public key.
• -f <filename> — File containing the key text to upload.
NOTE: The -f option is not supported on Telnet or SSH or serial RACADM.
• -v — View the key text for the index provided.
• -d — Delete the key for the index provided.
Example
• Upload an invalid key to iDRAC User 2 in the first key space using a string.
$ racadm sshpkauth -i 2 -k 1 -t "This is invalid key
Text"
ERROR: Key text appears to be corrupt
• Upload a valid key to iDRAC User 2 in the first key space using a file.
$ racadm sshpkauth -i 2 -k 1 -f pkkey.key
Key file successfully uploaded.
• Get all keys for User 2 on iDRAC.
$ racadm sshpkauth -v -i 2 -k all
********************* User ID 2 ******************
Key ID 1:
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEAzzy
+k2npnKqVEXGXIzo0sbR6JgA5YNbWs3ekoxXV
fe3yJVpVc/5zrrr7XrwKbJAJTqSw8Dg3iR4n3vUaP
+lPHmUv5Mn55Ea6LHUslAXFqXmOdlThd
91