Configuring and using the ssh-agent.
配置和使用ssh - agent。
Automating machine access using ssh-agent.
使用ssh - agent自动化机器访问。
Then, verify that the ssh-agent is running.
然后,确认ssh - agent在运行。
Next, query ssh-agent to generate Bourne shell commands on stdout.
接下来,查询ssh - agent以在标准输出中生成Bourneshell命令。
Now, list the currently loaded identities within the running ssh-agent.
现在,在运行的ssh - agent内列出当前加载的身份。
Now, you can verify that those identities are loaded into the running ssh-agent.
现在,您可以确认将这些身份加载到运行的ssh - agent中。
Ssh-agent has now become a background process which is visible using the top and ps commands.
现在,ssh - agent已经成为后台进程,可以使用命令top和ps查看。
Finally, test the ssh-agent with SSH command syntax. Note that now there's no passphrase prompt.
最后,使用ssh命令语法测试ssh - agent。
The ssh-agent program ACTS like a gatekeeper, securely providing access to security keys as needed.
ssh - agent程序如同一个看门人,它根据需要安全地提供对安全密钥的访问。
The eval command tells the shell to evaluate (execute) the commands generated by the ssh-agent program.
eval命令告诉shell计算(执行)ssh - agent程序生成的命令。
We can instruct the shell to execute the output commands which ssh-agent displays using the shell's eval command.
使用eval命令可以指示shell执行ssh - agent显示的输出命令。
To do so, we must use a program called ssh-add, which adds (sends) our passphrase to the running ssh-agent program.
为此,必须使用程序ssh - add将密码短语添加(发送)至运行中的ssh - agent程序。
For the truly paranoid who refuse to create a password-less SSH public-private key pair, there's the ssh-agent utility.
对于拒绝创建无密码ssh公私密钥对的真正的偏执狂来说,有一个ssh - agent实用程序。
For example, the process of creating the keys, installing them, and getting ssh-agent to execute via a.bash_profile only has to be done once per machine.
例如,创建密钥、安装密钥、通过. bash_profile执行ssh - agent的过程在每台机器只需要进行一次。
The reason that cron processes can't communicate with ssh-agent is that cron jobs are executed as child processes by cron and thus do not inherit the $SSH_AUTH_SOCK shell variable.
cron进程不能与ssh-agent通信的原因是,cron作业是作为 cron 的子进程来执行,这样它们就不会继承 $SSH_AUTH_SOCK。
So far, we've learned about several OpenSSH programs (SSH, SCP, ssh-agent and ssh-add), and we've created and installed private and public keys to enable a secure and automated login process.
迄今为止,我们已经学习了几个OpenSSH程序(ssh、scp、ssh - agent和ssh - add),而且我们已经创建并安装了私钥与公钥来支持安全、自动化登录过程。
Normally, you have to enter this passphrase every time you want to connect to any remote cloud instance that USES the key, but there is a secure way to avoid this annoyance: Employ an SSH agent.
通常,每次连接使用此密钥的任何远程云实例时,都必须输入这个密码,但是有一种安全的方法可以避免这种麻烦:使用SSH代理。
Then check the attribute of the hosts-the object should be online, its agent level should be level 1, and the supported protocols are SSH and CIM.
然后检查主机的属性—对象应该保持联机状态,其代理级别应该为一级,支持的协议应为ssh和CIM。
Then you can make use of the SSH agent to evade the whole issue entirely.
然后您可以使用SSH代理完全逃避整个问题。
Then you can make use of the SSH agent to evade the whole issue entirely.
然后您可以使用SSH代理完全逃避整个问题。
应用推荐