Public Key Authentication Configuration
This is an alternative security method to using passwords. To use public key authentication, you must generate a public and a private key (a key pair). The public key is stored in any remote hosts on which you have accounts. The private key is saved on the computer you use to connect to those remote hosts. This method allows you to log into those remote hosts, and transfer files to them, without using your account passwords.
Perform the following configuration steps to make the UNIX computer the server and IdentityIQ computer the client:
-
Generate Private and Public keys. For more information of the standard steps, refer to Troubleshooting.
-
Append the contents of public key file to
~/.ssh/authorized_keys
as shown below.cat <public key file> >> ~/.ssh/authorized_keys
-
Copy the private key file to a location accessible by the IdentityIQ server.
-
Provide private key file's path into the application configuration.