![]() ![]() If you have the key file, you can log on. Key files contain more data than a password, so they are harder to crack. SSH keys provide a convenient and secure way to log in without needing passwords. If you logged in successfully, you can now use PASE commands (ls, cd, cat, etc.), yum (if installed), and the full range of open source software available on your IBM i. Alternatively, if you’re using OpenSSH from another system, you can use the -v flag and look for the “Server host key” line. ![]() TIP: If you are not sure whether to trust the address you were given, you can run ssh localhost (since SC1 uses OpenSSH) on the IBM i from QP2TERM or QSH and make sure the fingerprint matches. If the host’s fingerprint changes, SSH will warn you and refuse to connect, in case the server is an impostor. When you enter “yes” here, SSH will remember the host’s fingerprint and keep trusting it. SSH employs a “trust on first use” model. From a terminal/command prompt, enter the following command:Īre you sure you want to continue connecting ( yes / no / ) ? If the ACS “SSH Terminal” link does not work for you, you can open an SSH session manually. The easiest way to start a SSH session is with the Access Client Solutions (ACS) “SSH Terminal” option, which will launch a properly configured SSH client. Run ssh from any PASE-enabled terminal, such as QP2TERM, QSH, or another open SSH session.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |