Configuring and using the ssh-agent.
配置和使用ssh - agent。
Automating machine access using ssh-agent.
使用ssh - agent自动化机器访问。
Next, query ssh-agent to generate Bourne shell commands on stdout.
接下来,查询ssh - agent以在标准输出中生成Bourneshell命令。
Ssh-agent has now become a background process which is visible using the top and ps commands.
现在,ssh - agent已经成为后台进程,可以使用命令top和ps查看。
Finally, test the ssh-agent with SSH command syntax. Note that now there's no passphrase prompt.
最后,使用ssh命令语法测试ssh - agent。
The ssh-agent program ACTS like a gatekeeper, securely providing access to security keys as needed.
ssh - agent程序如同一个看门人,它根据需要安全地提供对安全密钥的访问。
The eval command tells the shell to evaluate (execute) the commands generated by the ssh-agent program.
eval命令告诉shell计算(执行)ssh - agent程序生成的命令。
We can instruct the shell to execute the output commands which ssh-agent displays using the shell's eval command.
使用eval命令可以指示shell执行ssh - agent显示的输出命令。
To do so, we must use a program called ssh-add, which adds (sends) our passphrase to the running ssh-agent program.
为此,必须使用程序ssh - add将密码短语添加(发送)至运行中的ssh - agent程序。
For the truly paranoid who refuse to create a password-less SSH public-private key pair, there's the ssh-agent utility.
对于拒绝创建无密码ssh公私密钥对的真正的偏执狂来说,有一个ssh - agent实用程序。
For example, the process of creating the keys, installing them, and getting ssh-agent to execute via a.bash_profile only has to be done once per machine.
例如,创建密钥、安装密钥、通过. bash_profile执行ssh - agent的过程在每台机器只需要进行一次。
The reason that cron processes can't communicate with ssh-agent is that cron jobs are executed as child processes by cron and thus do not inherit the $SSH_AUTH_SOCK shell variable.
cron进程不能与ssh-agent通信的原因是,cron作业是作为 cron 的子进程来执行,这样它们就不会继承 $SSH_AUTH_SOCK。
So far, we've learned about several OpenSSH programs (SSH, SCP, ssh-agent and ssh-add), and we've created and installed private and public keys to enable a secure and automated login process.
迄今为止,我们已经学习了几个OpenSSH程序(ssh、scp、ssh - agent和ssh - add),而且我们已经创建并安装了私钥与公钥来支持安全、自动化登录过程。
Normally, you have to enter this passphrase every time you want to connect to any remote cloud instance that USES the key, but there is a secure way to avoid this annoyance: Employ an SSH agent.
通常,每次连接使用此密钥的任何远程云实例时,都必须输入这个密码,但是有一种安全的方法可以避免这种麻烦:使用SSH代理。
Then check the attribute of the hosts-the object should be online, its agent level should be level 1, and the supported protocols are SSH and CIM.
然后检查主机的属性—对象应该保持联机状态,其代理级别应该为一级,支持的协议应为ssh和CIM。
Then check the attribute of the hosts-the object should be online, its agent level should be level 1, and the supported protocols are SSH and CIM.
然后检查主机的属性—对象应该保持联机状态,其代理级别应该为一级,支持的协议应为ssh和CIM。
应用推荐