05-25-2011
Does Solaris 8 accept this key from a local Solaris 8 login?
Did you use a binary copy, not barefoot FTP?
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
do we need root access for the remote server to ssh without a password(i.e by using id_rsa.pub method)??? (1 Reply)
Discussion started by: roshanjain2
1 Replies
2. UNIX for Advanced & Expert Users
When should one have to generate a public key on a Server when the public key is already created and used by other clients?
Thanks,
Rahul. (6 Replies)
Discussion started by: rahulrathod
6 Replies
3. AIX
I did successful yestday as Porter's doc:
1. Create private/pub key on AIX:
$ssh-keygen -t identity
2. Get my private key from the AIX server, found in $HOME/.ssh/identity
Put that on Windows box.
I use WinSCP to transfer private key from AIX to Windows
3. Run puttygen.exe and... (8 Replies)
Discussion started by: rainbow_bean
8 Replies
4. Solaris
Hi Gurus
I have a solaris box from which i will have to sftp into a windows box.
I have installed core ftp server in the windows box and so am able to log in.
My problem is that,I have to enable password less authentication between solaris box and this core ftp server. How do i do this?
... (1 Reply)
Discussion started by: Hari_Ganesh
1 Replies
5. Shell Programming and Scripting
I am writing a script that needs to access various servers some of which are not ssh enabled. In order to access the ssh enabled servers I am using the following command to generate the public key :
ssh-keygen -t rsa
Is there a similar command for the other servers as well.
If I try to use... (1 Reply)
Discussion started by: ravneet123
1 Replies
6. UNIX for Dummies Questions & Answers
Hi,
We are currently implementing an Identity Management application which has several Unix systems as its target system. A pre-defined connector will be installed to provide connection between the Identity Management application and the Unix target system. The connection will use Public Key... (1 Reply)
Discussion started by: tristanD
1 Replies
7. Red Hat
Hi All;
I have an issue with password less authentication via ssh ( v2)
I have two servers Server A and Server B, following are the server details
Server A
OS - HP UX B.11.11 U 9000/800
SSH - OpenSSH_4.3p2-hpn, OpenSSL 0.9.7i 14 Oct 2005
HP-UX Secure Shell-A.04.30.000, HP-UX... (3 Replies)
Discussion started by: maverick_here
3 Replies
8. Solaris
Hi i am using solaris 10.I am trying to setup a public/private key but it is not working.Appreciate your repsonse on it
There are two servers DB1 server and DB2 server.
1)I have generated public/private key using below step on both servers.
ssh-keygen -t rsa
2)From DB1 server moved the... (6 Replies)
Discussion started by: muraliinfy04
6 Replies
9. Shell Programming and Scripting
I generated a public key that we are using for ssh and sftp but I noticed that I am still being asked for a password when I run my script. is there something I need to put in my script?
Our linux guy said he placed keys on both servers. (2 Replies)
Discussion started by: MJCreations
2 Replies
10. UNIX for Beginners Questions & Answers
I generated rsa key-pair, Using puttygen.exe running on windows, I imported the private key and tried to use it to login to a CentOS Linux release 7.5.1804 (Core) (running on VirtualBox) and it gives the following error: "server refused our key".
I tried to search for solution and some of the... (0 Replies)
Discussion started by: Chiadi
0 Replies
LEARN ABOUT OPENSOLARIS
trusted_extensions
trusted_extensions(5) Standards, Environments, and Macros trusted_extensions(5)
NAME
trusted_extensions - Solaris Trusted Extensions
DESCRIPTION
SolarisTM Trusted Extensions software is a specific configuration of the Solaris Operating System (Solaris OS). Solaris Trusted Extensions
(Trusted Extensions) provides labels for local objects and processes, for the desktop and windowing system, for zones and file systems, and
for network communications. These labels are used to implement a Multilevel Security (MLS) policy that restricts the flow of information
based on label relationships. In contrast to Discretionary Access Control (DAC) based on ownership, the MLS policy enforced by Trusted
Extensions is an example of Mandatory Access Control (MAC).
By default, Trusted Extensions software is disabled. It is enabled and disabled (but not configured) by the labeld(1M) service, identified
by the FMRI:
svc:/system/labeld:default
Refer to the Administrator's Guide listed below for the required configuration of Trusted Extensions software necessary before use. The
system must be rebooted after enabling or disabling labeld to activate or deactivate Trusted Extensions software.
SEE ALSO
labeld(1M), label_encodings(4), labels(5)
Solaris Trusted Extensions Administrator's Procedures
Solaris Trusted Extensions User's Guide
SunOS 5.11 12 Nov 2007 trusted_extensions(5)