1, execute command and script on remote host based on password and secret keySsh-t IP "CLI or shell.sh";The 2,C program implements the above functions--based on password-lessPorting the simple C program above to a different system to use the testAuthorized_keys;Copy the ~/.ssh/id_rsa.pub itself to the host that needs passwordless and append the id_rsa.pub content to the ~/.
First. Description of the problem
The 11GR2 11.2.0.3 RAC is installed on the AIX operating system, and a INS-06006 error is encountered while installing grid. The error message is as follows
Second, the processing process
1, testing the interoperability of SSH
In the Node1 node
Date;ssh Node2 date;
Date;ssh Node2-pr
Ssh password-less hand settings because many configurations on the Internet and password-less login are not easy to use, I just wrote a plug-in for your reference, I have prepared three test machines, the requirement is that all three machines can access each other without a password. The steps are as follows: www.2cto.com Java code 192.168.100.67 master 192.168.100.68 slave1 192.168.100.69 slave2 enters th
The cause of the error occurred. SSH Directory Permissions issuesFile permissions error under. ssh/PathThe client uses a key error to detect if the key is correctCheck the. SSH directory permissions, must be 700LL. SSHdrwx------2 root root 4096 January 16:34 sshDetection. ssh/path file permissions, Id_rsz.pub and Autho
Ssh configuration password-less login, ssh password login
Premise: machines A and B are all RedHat Linux operating systems and all have user
1. Log On with the user name and run the command on machine.
Ssh-keygen-t rsa
Press enter without a password
Run this operation to gen
Implement ssh password-less login and ssh password login
Here ssh refers to the OpenSSH SSH client, which is used to log on to a remote host and execute commands on the remote host. It aims to replace rlogin and rsh, and provide e
Key Login Step (password-free login)SSH Login provides two kinds of authentication methods: password (password) authentication method and key authentication method. where password (password) authentication method is one of our most commonly used, for security reasons, the introduction of key authentication methods to l
Set shortcuts for ssh Login and ssh Login
Configure in your own environment ~ /. Ssh/config
Host k231
HostName 192.168.1.231User kyee
The original ssh Login 192.168.1.231 command
Ssh-keygen generates a public and private key pair.Ssh-copy-id The local public key is copied to the remote machine's Authorized_keys file, Ssh-copy-id can also let you have to the remote machine/home/username/.ssh and ~/.ssh/authorized_ The right to the keys.Operation Record:1) First step: Use
Configure ssh password-less login and ssh password login
Wanshi is only available after dual-host mutual configuration several times. I can't remember the direction, but I can't remember it here.
A wants to link B, and A gives B its own public key1
Zxw @ hostUbuntu1 :~ $ Ssh
Environment:192.168.2.10192.168.2.11Implementation: 2.10 SSH without password login to 2.11In 2.10 ssh to 2.11 machines, a password is required, which makes it inconvenient for some scripts to work because of the need for a password, which requires manual intervention. The previous method is to copy Authorized_keys inside (remember, before), recently found a comm
~/.ssh, and ~/.ssh/authorized_keys for the remote host are also set to the appropriate permissions.3. Client machine test via ssh-v [email protected] No password login server,-V can debug the entire process, can be adjusted wrong.The problem that appears in 1:Ssh-copy-id:/u
1. A host generates a key pairssh-keygen-t RSA2. The public key of host A is sent to Host BSCP id_rsa.pub Linux2:/cloud //SCP: is a command of the SSH protocol, remote replication3. Add a host's public key to the authorization list of Host B(1) General B host has just started and did not have this file, first and a as first created. SSH directoryssh-keygen-t RSA(2) Add the Authorized_keys file to the
:
$ Password: (enter Password)
At this point, if the secret is correct, you can log in.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
In the trust environment, if each remote login, you have to enter a password, feel too wasted time, especially the password is very complex, maintenance of the server more than the case.
So there is a normal need: you do not have to enter a password to achieve remote logins.
The implement
Ssh password-free login, ssh password login
Assume that the master machine A, B, and C needs to be established as the master machine A. You can directly access the master machine B and C through ssh without A password. The procedure is as follows:
Assume that you only use th
Environment:192.168.2.10192.168.2.11Implementation: 2.10 SSH without password login to 2.11In 2.10 ssh to 2.11 machines, a password is required, which makes it inconvenient for some scripts to work because of the need for a password, which requires manual intervention. The previous method is to copy Authorized_keys inside (remember, before), recently found a comm
Configure ssh password-free login and ssh password loginTake the root account as an example to prepare more than two Linux servers. Here I use s204 and s205. multiple servers use ssh to log on to the server first, if ssh s205 is not installed, the system will prompt you to e
://security.zdnet.com.cn/ security_zone/2009/1214/1556391.shtmlhttp://blog.chinaunix.net/uid-25723371-id-4542221.html http://www.cyberciti.biz/faq/ssh-passwordless-login-with-keychain-for-scripts/http: heyihome.blog.51cto.com/2657805/4808851. Modify the SSH portThe default port for
Linux ssh password-free login, ssh password login
Generate public keys and keys on the client Execute
Ssh-keygen-t rsa-p''
Press enter to generate both the public key and the key.
Add the public key of the client to the public key file of the Server for authentication.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.