11-13-2012
Hello, do you have other kind of authentication enabled?
As GSSAPI for example? We got a problem of slow password prompt due to the GSSAPI being enabled.
Once disabled, as we don't need it, the prompt is fast as should be.
Cheers.
10 More Discussions You Might Find Interesting
1. UNIX and Linux Applications
Hi,
I am using a remote storage service for backing up our data - we want to have a script run as part of a cron job which would do the backups from our local Linux machine to the service's Linux machine.
I want to use tar and ssh to do this (rather than mounting the disk and using cp) .... (5 Replies)
Discussion started by: same1290
5 Replies
2. Linux
Hi All,
I've followed the exact same steps of how to setup and enable SSH user equivalent including the right permission, but when I "ssh" it still prompts for password. Could you help to see what I did wrong?
I appreciate any helps.
:confused:
server1.com:/u01/oracle
RAC1 > mkdir... (2 Replies)
Discussion started by: Beginer0705
2 Replies
3. UNIX for Dummies Questions & Answers
I have 3 Solaris 10 UNIX servers, the shadow and passwd file are all identical and are automatically sync every 5 minutes. A majority of the users do not have CLI access but rather use a menu. I currently have menu options that allows them to rlogin to another server and I need to have the... (1 Reply)
Discussion started by: creedonjm
1 Replies
4. Solaris
Hi,
I am using DSEE 6.3 to authenticate and authorize my Solaris 9 and 10 users. Everything works fine except password expiration. I use built-in global password policy for all users. The policy works well. However I could not find the right pam configuration in order to prompt users at ssh... (2 Replies)
Discussion started by: niyazi
2 Replies
5. SuSE
Hello,
I would like to change a password of a user to a simple one but when i try to add an only lowercase pass i get the error:
Weak password: too short.
Try again.
You can now choose the new password.
A valid password should be a mix of upper and lower case letters,
digits, and... (2 Replies)
Discussion started by: @dagio
2 Replies
6. SuSE
Can anyone give me a little clue on why the hard drive cache read timings on sles 9 is better then sles 11? The same hardware was used in both test. I even deleted the ata_generic module from initrd.
The speed difference is 10MB vs 5 MB
Thanks (1 Reply)
Discussion started by: 3junior
1 Replies
7. AIX
hello,
i am running an AIX 5.3 machine and i want to connect via ssh to the RPA Management site without prompting for password.
i already had a public key of this server as i use the same thing for ssh connection with other AIX machines.
i connected to the RPA Management Site and i run the... (9 Replies)
Discussion started by: omonoiatis9
9 Replies
8. Programming
Hello forum,
I want to have a function to test for passwordless SSH setup. Pretty simple. However, what I'm finding difficult is to NOT return a password prompt to screen IF it's not in place.
Here's the function:
check_passwordless_ssh_working()
#check passed parameter, assuming it is... (4 Replies)
Discussion started by: doonan_79
4 Replies
9. Red Hat
I am not sure what I am missing here. I have the following identical entry in /etc/sudoers on multiple Red Hat 6.4 servers.
icinga ALL=NOPASSWD:/usr/bin/yum --security --exclude\="kernel*" check-update
On one server when I enter the command over SSH as follows it works fine.
ssh -t -q... (1 Reply)
Discussion started by: scotbuff
1 Replies
10. Shell Programming and Scripting
Hi All,
I want to copy /.ssh/OM.pub file from source to destination.
Here source IP address, username and password is always fixed.
Whereas destination server IP address, password always gets changed.
From destination server :-
I am trying to write a script in which it should log in to... (3 Replies)
Discussion started by: madhur.baharani
3 Replies
LEARN ABOUT DEBIAN
oneuser
ONEUSER(1) oneuser(1) -- manages OpenNebula users ONEUSER(1)
NAME
oneuser
SYNOPSIS
oneuser command [args] [options]
OPTIONS
-r, --read-file Read password from file
--sha1 The password will be hashed using the sha1 algorithm
--ssh SSH Auth system
--x509 x509 Auth system for x509 certificates
-k, --key path_to_private_key_pem Path to the Private Key of the User
-c, --cert path_to_user_cert_pem Path to the Certificate of the User
--driver driver Driver to autehnticate this user
--x509_proxy x509 Auth system based on x509 proxy certificates
--proxy path_to_user_proxy_pem Path to the user proxy certificate
--time x Token duration in seconds, defaults to 3600 (1 h)
-l, --list x,y,z Selects columns to display with list command
-d, --delay x Sets the delay in seconds for top command
-x, --xml Show the resource in xml format
-n, --numeric Do not translate user and group IDs
-v, --verbose Verbose mode
-h, --help Show this message
-V, --version Show version and copyright information
COMMANDS
o create username [password]
Creates a new User
Examples:
oneuser create my_user my_password
oneuser create my_user -r /tmp/mypass
oneuser create my_user --ssh --key /tmp/id_rsa
oneuser create my_user --ssh -r /tmp/public_key
oneuser create my_user --x509 --cert /tmp/my_cert.pem
valid options: read_file, sha1, ssh, x509, key, cert, driver
o update userid
Launches the system editor to modify and update the template contents
o login username
Creates the Login token for authentication
Examples:
oneuser login my_user --ssh --key /tmp/id_rsa --time 72000
oneuser login my_user --x509 --cert /tmp/my_cert.pem --key /tmp/my_key.pk --time 72000
oneuser login my_user --x509_proxy --proxy /tmp/my_cert.pem --time 72000
valid options: ssh, x509, x509_proxy, key, cert, proxy, time
o key
Shows a public key from a private SSH key. Use it as password
for the SSH authentication mechanism.
valid options: key
o delete range|userid_list
Deletes the given User
o passwd userid [password]
Changes the given User's password
valid options: read_file, sha1, ssh, x509, key, cert, driver
o chgrp range|userid_list groupid
Changes the User's main group
o chauth userid [auth] [password]
Changes the User's auth driver and its password (optional)
Examples:
oneuser chauth my_user core
oneuser chauth my_user core new_password
oneuser chauth my_user core -r /tmp/mypass
oneuser chauth my_user --ssh --key /home/oneadmin/.ssh/id_rsa
oneuser chauth my_user --ssh -r /tmp/public_key
oneuser chauth my_user --x509 --cert /tmp/my_cert.pem
valid options: read_file, sha1, ssh, x509, key, cert, driver
o list
Lists Users in the pool
valid options: list, delay, xml, numeric
o show [userid]
Shows information for the given User
valid options: xml
ARGUMENT FORMATS
o file
Path to a file
o range
List of id's in the form 1,8..15
o text
String
o groupid
OpenNebula GROUP name or id
o userid
OpenNebula USER name or id
o userid_list
Comma-separated list of OpenNebula USER names or ids
o password
User password
LICENSE
OpenNebula 3.4.1 Copyright 2002-2012, OpenNebula Project Leads (OpenNebula.org)
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may
obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0
April 2012 ONEUSER(1)