Reference Guide

NOTE:
For DSA keys greater than 2048, use the following racadm command:
racadm -r 192.168.8.14 -u root -p calvin sshpkauth -i
svcacct -k 1 -p 0xfff -f dsa_2048.pub
CMC accepts RSA keys up to key strength 4096, but the recommended key
strength is 1024.
Synopsis
racadm sshpkauth -i svcacct -k <key_index> -p <privilege> -t
<PK_key_text>
racadm sshpkauth -i svcacct -k <key_index> -p <privilege> -f
<PK_key_text>
racadm sshpkauth -v -i svcacct -k all|<key_index>
racadm sshpkauth -d -i svcacct -k all|<key_index>
Input
-i <user_index> — Index for the user, it must be svcacct for CMC.
-k [<key_index> | all] — Index to assign the PK key being uploaded. all only
works with the
-v or -d options. <key_index> must be between 1 to 6 or all on
CMC.
-p <privilege> — Level to give to user for this PK key.
-r <cmcIpAddr> — Specifies the controller’s remote IP address.
-u <username> — Specifies the user name.
-t <PK_Key_Text> — Key text for the SSH Public key.
-f <filename> — File containing the key text to upload.
NOTE: The -f option is not supported on Telnet or SSH or serial RACADM.
-v — View the key text for the index provided.
-d — Delete the key for the index provided.
Example
Upload an invalid key to iDRAC User 2 in the first key space using a string.
$ racadm sshpkauth -i 2 -k 1 -t "This is invalid key
Text"
ERROR: Key text appears to be corrupt
Upload a valid key to iDRAC User 2 in the first key space using a file.
$ racadm sshpkauth -i 2 -k 1 -f pkkey.key
Key file successfully uploaded.
Get all keys for User 2 on iDRAC.
$ racadm sshpkauth -v -i 2 -k all
********************* User ID 2 ******************
Key ID 1:
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEAzzy
+k2npnKqVEXGXIzo0sbR6JgA5YNbWs3ekoxXV
fe3yJVpVc/5zrrr7XrwKbJAJTqSw8Dg3iR4n3vUaP
+lPHmUv5Mn55Ea6LHUslAXFqXmOdlThd
91