Sponsored Content
Top Forums Shell Programming and Scripting How to run commands on remote server using ssh password less authentication? Post 302933690 by Chubler_XL on Sunday 1st of February 2015 05:52:19 PM
Old 02-01-2015
Remote server will have same permissions to the filesystem that the "username" user has.

Why not try running the command from an interactive shell you can then debug/sort out required permissions:

Code:
$ ssh username@ipaddress
Last login: Fri Jan 30 16:19:27 2015 from your-pc.your.domain

ipaddress $ cat /path-to-file/file
This is the file contents

ipaddress $ exit
Connection to ipaddress closed.

$

 

10 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Ability to run sas prog on remote server using SSH

Hi, I am trying to run a sas prog on a remote server using ssh. I have got the command that I am using in the below paragraph. With it, I was able to run shell scripts but when I tried 'sas' it errored out. I have got my keys exchanged so when I say ssh serverA I automatically connect to my... (4 Replies)
Discussion started by: coolavi
4 Replies

2. Shell Programming and Scripting

[SSH] Need to connect to remote server as different user and without password

I have a task requiring that USER_A run a script, which connects to HOST_B as USER_B and does not ask for a password. If I am logged in on HOST_A as USER_B, I can connect to HOST_B without a password, no problem. However, if I try running ssh with the command line "ssh USER_B@HOST_B" while... (3 Replies)
Discussion started by: Totengraber
3 Replies

3. Solaris

how to login with ssh to remote system with out applying the remote root/usr password

how to login with ssh to remote system with out applying the remote root/user password with rlogin we can ujse .rhosts file but with ssh howits possible plz guide (2 Replies)
Discussion started by: tv.praveenkumar
2 Replies

4. Shell Programming and Scripting

executing commands in remote server using ssh

I have some commands which need to be executed in remote machine. I have Linux Server from where I need to connect to Solaris server using ssh and then declare some variable over there and run some commands. I don't want to call a script which is present in Solaris server from Linux server... (7 Replies)
Discussion started by: maitree
7 Replies

5. UNIX for Dummies Questions & Answers

SSH Keys Authentication keeps asking for password

Hi! Im trying to set access from ServerA(SunOS) to ServerB(Some custom Linux with Keyboard Interactive login) with SSH Keys. As a proof of concept I was able to do it between 2 virtual machines. Now in my real life scenario it isnt working. I created the keys in ServerA, copied them to... (7 Replies)
Discussion started by: RedSpyder
7 Replies

6. Red Hat

prompting for passwords even i configured ssh password less authentication

There are two servers : 1. Site 2. Testing from site server i want to connect testing server with ssh password less authentication. i generated public and private keys with ssh-keygen -t rsa on site server. cat id_rsa >> authorized_keys cat id_rsa.pub >> authorized_keys i... (15 Replies)
Discussion started by: rehantayyab82
15 Replies

7. IP Networking

Cygwin remote ssh with key authentication method

Hi experts, I am not sure in which forum to submit this question. If this is not the correct place then please let me know where to submit this thread. My requirement is to invoke windows batch scripts from linux shell script. Hence, I have installed openssh in Cygwin on the windows machine.... (2 Replies)
Discussion started by: ahmedwaseem2000
2 Replies

8. Shell Programming and Scripting

Running Commands on a Remote Linux Server over SSH

Hello, I'm trying to create a ksh script to ssh to a remote server, enter the password and a couple commands. For security reasons I have changed the login, password and ip in my example. #!/bin/ksh ssh -t -t username@12.5.5.3 << EOF password cd bin pwd EOF When I run it. It... (5 Replies)
Discussion started by: seekryts15
5 Replies

9. Shell Programming and Scripting

Ssh - running commands on remote server

Hi, I am trying to run commands on a list of servers that I can ssh to and just want to know if there is a 'cleaner' way of doing this. At the moment, I am doing as below. Is there a way that I can escape the double quote differently? If a use a single quote to enclose the commands that I... (1 Reply)
Discussion started by: newbie_01
1 Replies

10. Ubuntu

Run a script at remote server without ssh password

Hello, What I want to do is to run a file on remote server by running a script at localhost but script should not ask ssh password of my remote server when script is executed. Scenario1: To copy files from server2 to data server:$ scp -r root@server2_ip:/var/www/html/*.* /var/ When I enter... (6 Replies)
Discussion started by: baris35
6 Replies
smtnrhdb(1M)						  System Administration Commands					      smtnrhdb(1M)

NAME
smtnrhdb - manage entries in the tnrhdb database SYNOPSIS
/usr/sadm/bin/smtnrhdb subcommand [auth_args] -- subcommand_args] DESCRIPTION
The smtnrhdb command adds, modifies, deletes, and lists entries in the tnrhdb database. The tnrhdb database specifies which remote-host template to use for each host, including the local host, in the distributed system. If a host's IP address cannot be matched to some entry in the tnrhdb database, communication with the host is not permitted. The smtnrhdb command requires the Solaris Management Console to be initialized for the command to succeed (see smc(1M)). After rebooting the Solaris Management Console server, the first smc connection can time out, so you might need to retry the command. Valid Host Addresses and Wildcards The trusted network software uses a network "longest prefix of matching bits" mechanism when looking for a host. The software looks first for the IP address of the host. If the software does not find this address, then the software falls back to searching for an IP address with the longest prefix of a matching bit pattern, and so on. Note - The actual numeric value of the subnet address or other subnetting information on the system (for example, from the netmasks(4) file) are not considered by this mechanism. Using the "longest prefix of matching bits" mechanism, an IPv4 address of 0.0.0.0 is a wildcard address with a prefix length of 0 and hence matches any IPv4 address. For more information about prefi x lengths in IPv4 and IPv6 addresses, see System Administration Guide: IP Ser- vices. The smtnrhdb command accepts a hostname, IP address, and wildcard address with as optional prefix as valid addresses. See subcommand_args, below, for the format of valid addresses. SUB-COMMANDS smtnrhdb subcommands are: add Adds a new entry to the tnrhdb database. To add an entry, the administrator must have the solaris.network.host.write and solaris.net- work.security.write authorizations. delete Deletes an entry from the tnrhdb database. To delete an entry, the administrator must have the solaris.network.host.write and solaris.network.security.write authorizations. list Lists all entries in the tnrhdb database. To list an entry, the administrator must have the solaris.network.host.read and solaris.net- work.security.read authorizations. modify Modifies an entry in the tnrhdb database. To modify an entry, the administrator must have the solaris.network.host.write and solaris.network.security.write authorizations. OPTIONS
The smtnrhdb authentication arguments, auth_args, are derived from the smc arg set. These arguments are the same regardless of which sub- command you use. The subcommand-specific options, subcommand_args, must be preceded by the -- option. auth_args The valid auth_args are -D, -H, -l, -p, -r, and -u; they are all optional. If no auth_args are specified, certain defaults will be assumed and the user might be prompted for additional information, such as a password for authentication purposes. These letter options can also be specified by their equivalent option words preceded by a double dash. For example, you can use either -D or --domain. -D | --domain domain Specifies the default domain that you want to manage. The syntax of domain=type:/host_name/domain_name, where type is dns, ldap, or file; host_name is the name of the server; and domain_name is the name of the domain you want to manage. If you do not specify this option, the Solaris Management Console assumes the file default domain on whatever server you choose to man- age, meaning that changes are local to the server. Toolboxes can change the domain on a tool-by-tool basis; this option specifies the domain for all other tools. -H | --hostname host_name:port Specifies the host_name and port to which you want to connect. If you do not specify a port, the system connects to the default port, 898. If you do not specify host_name:port, the Solaris Management Console connects to the local host on port 898. -l | --rolepassword role_password Specifies the password for the role_name. If you specify a role_name but do not specify a role_password, the system prompts you to sup- ply a role_password. Passwords specified on the command line can be seen by any user on the system, hence this option is considered insecure. -p | --password password Specifies the password for the user_name. If you do not specify a password, the system prompts you for one. Passwords specified on the command line can be seen by any user on the system, hence this option is considered insecure. -r | --rolename role_name Specifies a role name for authentication. If you do not specify this option, no role is assumed. -u | --username user_name Specifies the user name for authentication. If you do not specify this option, the user identity running the console process is assumed. -- This option is required and must always follow the preceding options. If you do not enter the preceding options, you must still enter the -- option. subcommand_args Note: Descriptions and other arg options that contain white spaces must be enclosed in double quotes. -h Displays the command's usage statement. -H hostname Specifies the name of the host. For the list subcommand, the hostname argument is not specified. This is not required if the ipaddress subcommand argument is specified. -i ipaddress Specifies the IP address of the host. This is not required if the hostname subcommand argument is specified. This option is not valid with the -w option. -n templatename Specifies the name of an existing template. -p prefixlen Specifies the prefix length (in bits) of a wildcard representation of the IP address. The prefix is the left-most portion of the IP address. This option is valid only with the -w option. For example, when the value of -w ipaddress-wildcard is 192.168.0.0, a prefixlen value of 24 indicates that the wildcard matches all addresses on the 192.168.0 network. With a prefixlen of 32, the wildcard 192.168.0.0 matches all addresses on the 192.168.0.0 network. -w ipaddress-wildcard Specifies the IP address of the subnet using a wildcard. o One of the following sets of arguments must be specified for subcommand add: -H hostname -n templatename | -i ipaddress -n templatename | -w ipaddress-wildcard -n templatename [ -p prefixlen ] | -h o One of the following sets of arguments must be specified for subcommand modify: -H hostname -n templatename | -i ipaddress -n templatename | -w ipaddress-wildcard -n templatename [ -p prefixlen ] | -h o One of the following sets of arguments must be specified for subcommand delete: -H hostname | -i ipaddress | -w ipaddress-wildcard [ -p prefixlen ] | -h o The subcommand list takes the following argument: -h EXAMPLES
Example 1 Specifying the Template Name for a Wildcard IP Address The admin role specifies the template name, cipso_lan, for a series of hosts that use the IP address wildcard 192.168.113.0 on the local file system. Since no authorization arguments were specified, the administrator connects to port 898 of the local host on the local server with the file domain type, which are the defaults. The administrator is prompted for the admin password. $ usr/sadm/bin/smtnrhdb add -- -w 192.168.113.0 -n cipso_lan Example 2 Deleting an Entry in the tnrhdb Database The admin role connects to port 898 (which happens to be the default) of the LDAP server and deletes a host entry from the database by specifying its IP address, 192.168.113.8. Since the domain was not specified, the file domain type and local server are used by default. The administrator is prompted for the admin password. # /usr/sadm/bin/smtnrhdb delete -D ldap:/example.domain -i 192.168.113.8 Example 3 Adding a Subnet to the tnrhdb Database The following command adds all the addresses on the 192.168.55.0 subnet, from 192.168.55.1 to 192.168.55.255, to the tnrhdb database: # /usr/sadm/bin/smtnrhdb add -D file:/machine1.ExampleCo.COM/machine1.ExampleCo.COM -- -w 192.168.55.0 -n cipso Authenticating as user: root Type /? for help, pressing <enter> accepts the default denoted by [ ] Please enter a string value for: password :: Loading Tool: com.exampleco.admin.hostmgr.cli.smtnrhdb.HostMgrTnrhdbCli from machine1.ExampleCo.COM Login to machine1.ExampleCo.COM as user root was successful. Download of com.exampleco.admin.hostmgr.cli.smtnrhdb.HostMgrTnrhdbCli from machine1.ExampleCo.COM was successful. Example 4 Adding Subnet 192.168.0 to the tnrhdb Database The following command adds all the addresses on the 192.168.0 subnet, from 192.168.0.1 to 192.168.0.255 to the tnrhdb database. The prefix, 24, indicates that the first 24 bits (192.168.0) are fixed. Only the final zero is a wildcard. # /usr/sadm/bin/smtnrhdb add -D file:/machine1.ExampleCo.COM/machine1.ExampleCo.COM -- -w 192.168.0.0 -p 24 -n cipso Login to machine1.ExampleCo.COM as user root was successful. Download of com.exampleco.admin.hostmgr.cli.smtnrhdb.HostMgrTnrhdbCli from machine1.ExampleCo.COM was successful. EXIT STATUS
The following exit values are returned: 0 Successful completion. 1 Invalid command syntax. A usage message displays. 2 An error occurred while executing the command. An error message displays. FILES
The following files are used by the smtnrhdb command: /etc/security/tsol/tnrhdb Trusted network remote-host database. ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWmgts | +-----------------------------+-----------------------------+ |Interface Stability |Committed | +-----------------------------+-----------------------------+ SEE ALSO
smc(1M), netmasks(4), attributes(5) System Administration Guide: Security Services NOTES
The functionality described on this manual page is available only if the system is configured with Trusted Extensions. SunOS 5.11 19 Dec 2008 smtnrhdb(1M)
All times are GMT -4. The time now is 06:14 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy