Skip to content
pvmehta.com

pvmehta.com

  • Home
  • About Me
  • Toggle search form
  • This is im telling Kishore Oracle
  • tar and untar a dolder with all its subfolder. Linux/Unix
  • Search and replace pattern Linux/Unix
  • In Addition to previous note, following grants needed on PERFSTAT user. Oracle
  • Oracle 11g Training on 29JAN1010 Oracle
  • Implementing Listener Security Oracle
  • default permission on ~/.ssh/authorized_keys2 or authorized_keys Linux/Unix
  • Oracle Statspack survival Guide Oracle
  • To find explain plan for a statement that occurred in past. Oracle
  • Index Range Scan Oracle
  • Implementing Listener Security Oracle
  • Find nth max and min. Oracle
  • grep multuple patterns Linux/Unix
  • How to set Processes Parameter Oracle
  • find_du.ksh to find # of files, their sizes in current folder and its subdolder Linux/Unix

Implementation of key based authentications

Posted on 07-Oct-2005 By Admin No Comments on Implementation of key based authentications

*******************************************************************************************Step by Step Implementation of key based authentications from Source A to Destination B. *******************************************************************************************

(1) At source A

(1-A) Generate a Key

ssh-keygen -t dsa

Above command creates a public key file called : id_dsa.pub and private key called id_dsa

(1-B) Cat id_dsa.pub to the destination B and save as a file called authorized_keys for ssh1 or authorized_keys for ssh2 in the .ssh directory of that login-id.

(2) At the source then create a file called config with the foll contents

Host

User

Compression yes

Protocol 2

RSAAuthentication yes

StrictHostKeyChecking no < could be set to yes for stricter checking, I havent tried this>

ForwardAgent yes

ForwardX11 yes

IdentityFile /opt/app/oracle/.ssh/id_dsa

Linux/Unix, shell

Post navigation

Previous Post: Find Command
Next Post: Roles and Stored Object behaviour

Related Posts

  • tuning commmand for cpu, ip and memory stats Linux/Unix
  • Useful Solaris Commands on 28-SEP-2005 Linux/Unix
  • Changing default shell Linux/Unix
  • scp with ssh2 Linux/Unix
  • Sort with ASCII order and Numeric Order Linux/Unix
  • Passing from Unix to PLSQL using bind variables Linux/Unix

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Categories

  • AWS (2)
  • Azure (1)
  • Linux/Unix (149)
  • Oracle (392)
  • PHP/MYSQL/Wordpress (10)
  • Power-BI (0)
  • Python/PySpark (7)
  • RAC (17)
  • rman-dataguard (26)
  • shell (149)
  • SQL scripts (341)
  • Uncategorized (0)
  • Videos (0)

Recent Posts

  • load SPM baseline from cursor cache05-Jun-2025
  • Drop all SPM baselines for SQL handle05-Jun-2025
  • Load SPM baseline from AWR05-Jun-2025
  • Drop specific SQL plan baseline – spm05-Jun-2025
  • findinfo.sql (SQL for getting CPU and Active session info)27-May-2025
  • SQL Tracker by SID sqltrackerbysid.sql22-Apr-2025
  • How to connect to Oracle Database with Wallet with Python.21-Mar-2025
  • JSON/XML Types in Oracle18-Mar-2025
  • CPU Core related projections12-Mar-2025
  • Exadata Basics10-Dec-2024

Archives

  • 2025
  • 2024
  • 2023
  • 2010
  • 2009
  • 2008
  • 2007
  • 2006
  • 2005
  • Metalink Note: Note:250655.1 : ADDM Basics USING THE AUTOMATIC DATABASE DIAGNOSTIC MONITOR Oracle
  • Transfer SQL Profiles from One database to other database. Oracle
  • database trigger failing Oracle
  • Unix split command to split files Linux/Unix
  • create PLAN_TABLE command. Oracle
  • How to analyze statspack or AWR report. Oracle
  • How to start CRS manually Oracle
  • sess1.sql Oracle

Copyright © 2025 pvmehta.com.

Powered by PressBook News WordPress theme