Public Key Authentication Configuration
This is an alternative security method to using passwords. To use public key authentication, you must generate a public and a private key (that is, a key pair). The public key is stored on the remote hosts on which you have accounts. The private key is saved on the computer you use to connect to those remote hosts. This method allows you to log into those remote hosts and transfer files to them without using your account passwords.
Perform the following steps to configure the UNIX computer as the server and IdentityIQ computer as the client:
-
Generate the Private and Public keys. For more information of the standard steps, see Test Connection Fails for Key Based Authentication with an Error.
-
Append contents of the public key file to
~/.ssh/authorized_keys
as shown below.cat <public key file> >> ~/.ssh/authorized_keys
-
Copy the private key file to a location that is accessible by the server.
-
Provide the path of the private key file in the application configuration.