Create SSH keys for servers in a new or existing
PowerFlex system.
Prerequisites
Lockbox must be configured on the
PowerFlex Gateway.
About this task
A manually generated public-private key pair can be used to perform SSH key authentication, instead of passwords, between the
PowerFlex Gateway and
PowerFlex system servers. The public key is placed on all servers that will allow access to the
PowerFlex Gateway. The
PowerFlex Gateway is the owner of the matching private key.
FOSGWTool is used to upload the private key to the
PowerFlex Gateway. FOSGWTool is located in:
NOTE: For systems using SSH key authentication, there is no need to add node user name and password credentials to the CSV file used for system deployment.
Steps
Create the private and public key pair on the node where the
PowerFlex Gateway is installed:
In command line, run the command:
cd ~/.ssh/
Run the command:
ssh-keygen -t rsa
This command generates a private and public key. When performing this command, you can add a passphrase, or generate the key without a passphrase. Two SSH keys are produced:
id_rsa and
id_rsa.pub.
On one of the
PowerFlex servers, run this command to store the public key in the
authorized_keys file:
The
--key_passphrase is optional. Add this if you generated it when you created the key pair. During deployment, the gateway will use the private key for authentication.
Restart the
PowerFlex Gateway service:
Windows: From the Windows
Services window, restart the
EMC ScaleIO Gateway.
Linux: Type the following command:
service scaleio-gateway restart
Data is not available for the Topic
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\