07-09-2009
How to Set Dual authentication through SSH in AIX5.3
Hi,
How we can set dual authentication (Two Factor authentication) in SSH. is there any way to that or it is not possible in SSH.
Regards
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
ok well last night "something" caused by computer to "flip out"...i noticed that it seemed to be in dos but there was allot of info displaying on the screen real fast and after turning it off i was told there was no hard disk detected...
so after talking to tech support i got windows up and... (4 Replies)
Discussion started by: justchillin
4 Replies
2. UNIX for Dummies Questions & Answers
Hi all,
I have got a Solaris machine and I have several user account setup up with the .ssh and authorized_keys file in their home directories.
I have check all the permission and ownership and they are all indentical and belongs to the user ID and group respectively. However one of the... (3 Replies)
Discussion started by: stancwong
3 Replies
3. AIX
hi
Any one help me to install ssh on IBM-AIX5.2
in my machine i have this bellow rpms installed
zlib-1.2.3-3
prngd-0.9.23-3
openssl-0.9.7l-2
openssl-doc-0.9.7l-2
openssl-devel-0.9.7l-2
For ssh installing we need ssh rpms but i could not find openssh,openssh-server,openssh-client rpm's in... (3 Replies)
Discussion started by: chinni929
3 Replies
4. AIX
i got this error while installing ssh package time
bash-3.00# installp -d /openssh/ openssh.base
installp: No action was indicated.
The -a (apply) flag is being assumed.
+-----------------------------------------------------------------------------+
Pre-installation Verification...... (3 Replies)
Discussion started by: chinni929
3 Replies
5. AIX
Hello All,
After creating lpp_source/spot from AIX 5.3TL6-07 DVD on the NIM(AIX6.1), I went online and download the fix pack for reaching TL8-04. (it was less than 200Mgegs total)
then I did define a newer lpp_source530TL8-04 via a copy from the older lpp_source530TL6-07 (I diduse a command... (2 Replies)
Discussion started by: sangers
2 Replies
6. Shell Programming and Scripting
SSHing into a machine can take a few seconds, but after I'm in, the commands return quickly. I was wondering if the timeout setting can be changed once I'm logged into the machine. Does anyone know if this can be set on the fly? The problem here is, if I have to set timeout = 10, it'll take 10... (1 Reply)
Discussion started by: mrwatkin
1 Replies
7. Shell Programming and Scripting
If another machine has the same account how to ssh into that machine as the same user without re-typing password? Thanks (2 Replies)
Discussion started by: stevensw
2 Replies
8. HP-UX
When I am trying to connect to a sever using ssh, I happen to see the following statements in the server side logs:
none for user User rejected because it is unavailable
password for user User accepted
I am able to connect to the server, but I am getting that "rejected" message in logs.
... (16 Replies)
Discussion started by: chacko193
16 Replies
9. Shell Programming and Scripting
Hey team
I have to enable password less authentication betweeen A to B server and A to C server and A to D server.
For this I generated a ssh key on server A using ssh-keygen command and copied the key using ssh-copy-id command to B, C and D server. Everything is working fine as of now but... (5 Replies)
Discussion started by: Sandeep_sandy
5 Replies
LEARN ABOUT SUSE
ssh-copy-id
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine (presumably using a login password, so password authentication should be
enabled, unless you've done some clever use of multiple identities)
It also changes the permissions of the remote user's home, ~/.ssh, and ~/.ssh/authorized_keys to remove group writability (which would oth-
erwise prevent you from logging in, if the remote sshd has StrictModes set in its configuration).
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary)
SEE ALSO
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)