09-16-2010
I have both the RSA and the DSA key in the authorized_keys file on the remote host.
If your file permissions are correct, try regenerating the keys. Then copy the new keys to the authorized_keys file on the remote host.
HTH
8 More Discussions You Might Find Interesting
1. HP-UX
Hey,
I've asked questions about this project here before and gotten lots of help so I figured I'd give it another try.
I've recently set up my HP-UX environment to authenticate to a Windows Active Directory server (Windows Server 2003 R2).
I setup an account on Active Directory which works... (2 Replies)
Discussion started by: Rike255
2 Replies
2. Red Hat
Hi all,
I'm having some problems with joining an active directory domain as a member. My Linux servers using the same configuration across the board are all joining as domain controllers, which is bad.
I am running Samba 3.0.25b-0.4E.6 on all of my RHEL servers.
Here is my global... (1 Reply)
Discussion started by: Bert
1 Replies
3. AIX
It is possible to authenticate AIX-users to the Windows 2003 Active Directory.
But is it also possible to do full useradministration in the ADS without also adding users to the local AIX-server?
I have the following working:
1. Add user to the ADS
2. Add user to AIX with 'mkuser... (2 Replies)
Discussion started by: jacco
2 Replies
4. Solaris
Hi all. A while back i began looking a using Sun One JDS for our S10 environment which subsequently fell by the wayside as other more pressing things cropped up :-)
Now its ugly head has popped up again but with the prerequisite that we authenticate against AD.
So, i have a few questions.
... (6 Replies)
Discussion started by: boneyard
6 Replies
5. Shell Programming and Scripting
Hi,
Can any one please tell me the way to Authenticate success or failure of the login.
Here is my req:
I have to telnet to multiple unix servers and execute the a script there which will give me an integer output. This output should be directed to a txt file.
i dont want to provide... (1 Reply)
Discussion started by: csekhar05
1 Replies
6. AIX
I have AD (active directory) user, "asdf", created and a matching local AIX user name. Using "kinit", I can successfully authenticate it against the MS AD but when they I try to login via SSH with the same user name, it doesn't work. How can I get AIX to allow kerberos authentication as a valid... (1 Reply)
Discussion started by: kah00na
1 Replies
7. Red Hat
hi ,
Im configuring web site with authencation to a folder but the authentication is not happening.
below is the conf file of /etc/httpd/conf/httpd.conf
<VirtualHost 192.168.1.4:80>
DocumentRoot /var/www/html/
ServerName redhatclient.example.com
<directory... (0 Replies)
Discussion started by: redhatlbug
0 Replies
8. UNIX for Advanced & Expert Users
I'm authenticating with SSSD / Kerberos against Windows Server 2012 R2. I've setup credentails delegation using these options:
Host *
GSSAPIAuthentication yes
GSSAPIDelegateCredentials yes
GSSAPITrustDns yes
For both client/server but no luck. I've read online that I need to run... (2 Replies)
Discussion started by: Devyn
2 Replies
LEARN ABOUT DEBIAN
evp_pkey_cmp_parameters
EVP_PKEY_cmp(3SSL) OpenSSL EVP_PKEY_cmp(3SSL)
NAME
EVP_PKEY_copy_parameters, EVP_PKEY_missing_parameters, EVP_PKEY_cmp_parameters, EVP_PKEY_cmp - public key parameter and comparison
functions
SYNOPSIS
#include <openssl/evp.h>
int EVP_PKEY_missing_parameters(const EVP_PKEY *pkey);
int EVP_PKEY_copy_parameters(EVP_PKEY *to, const EVP_PKEY *from);
int EVP_PKEY_cmp_parameters(const EVP_PKEY *a, const EVP_PKEY *b);
int EVP_PKEY_cmp(const EVP_PKEY *a, const EVP_PKEY *b);
DESCRIPTION
The function EVP_PKEY_missing_parameters() returns 1 if the public key parameters of pkey are missing and 0 if they are present or the
algorithm doesn't use parameters.
The function EVP_PKEY_copy_parameters() copies the parameters from key from to key to.
The funcion EVP_PKEY_cmp_parameters() compares the parameters of keys a and b.
The funcion EVP_PKEY_cmp() compares the public key components and parameters (if present) of keys a and b.
NOTES
The main purpose of the functions EVP_PKEY_missing_parameters() and EVP_PKEY_copy_parameters() is to handle public keys in certificates
where the parameters are sometimes omitted from a public key if they are inherited from the CA that signed it.
Since OpenSSL private keys contain public key components too the function EVP_PKEY_cmp() can also be used to determine if a private key
matches a public key.
RETURN VALUES
The function EVP_PKEY_missing_parameters() returns 1 if the public key parameters of pkey are missing and 0 if they are present or the
algorithm doesn't use parameters.
These functions EVP_PKEY_copy_parameters() returns 1 for success and 0 for failure.
The function EVP_PKEY_cmp_parameters() and EVP_PKEY_cmp() return 1 if the keys match, 0 if they don't match, -1 if the key types are
different and -2 if the operation is not supported.
SEE ALSO
EVP_PKEY_CTX_new(3), EVP_PKEY_keygen(3)
1.0.1e 2014-08-06 EVP_PKEY_cmp(3SSL)