IP
Change directories to /flash/ssh/.
3
"Put" the AUTHORIZED_KEYS2 FILE into that directory.
4
5
Reboot the SCS.
New authentication keys are generated within a few minutes based on the list of authorized user public keys.
A file called host_dsa_key contains the authorized users' private identity keys. A file called
host_dsa_key.pub contains the authorized users' public identity keys.
Key generation, especially of host keys, can take a significant amount of time.
Note:
When the SCS boots for the first time or is factory defaulted, it must generate all
the keys. Depending on your SCS model, key generation could take between one
and five minutes.
As you add individual users, add their public key to the AUTHORIZED_KEYS2 file on your workstation
and FTP the updated file to the SCS.
If this file is located at SSH connection time, and the public key of the user is valid, the user will
automatically be logged into the Local> prompt or, if user authentication is configured on that port, the user
may be prompted for his username and password. See Database Configuration on page 11-9 for information
on configuring user authentication.
If this file is not located at connection time, the SCS proceeds to password authentication.
6.5.2.7 Username/Password Authentication (SSHv1 or SSHv2)
If RSA or DSA authentication fails, the SCS prompts the user for a password (or just a password, if the SSH
client forwarded the username). The user's name and password are then checked against the internal user
database, Radius, or Secure ID, in order of their precedence settings (if configured).
% ssh scs2
paul@scs2's password:
Expired local passwords cannot be updated and login scripts will not be run at
Note:
this point of the SSH process.
Once the username and password are verified, SSH authentication is complete. The user will be moved on
to any previously configured user authentication (as enabled with the Set/Define Ports Authenticate
command) that would normally apply to a login on that port. At this point, all authentication methods,
including RADIUS and SecurID, will be available, and expired local passwords will be prompted for
updates.
Figure 6-29: Username/Password Authentication
6-14
Establishing Sessions
Need help?
Do you have a question about the SCS and is the answer not in the manual?
Questions and answers