Skip to content
pvmehta.com

pvmehta.com

  • Home
  • About Me
  • Toggle search form
  • Find sort details from Db find_sort.sql Oracle
  • Finding Oracle Patches with opatch Oracle
  • Formatter Explain plan Output 1 Oracle
  • Order by with ROWNUM Oracle
  • Flowers Resize datafiles Oracle
  • How to connect to Oracle Database with Wallet with Python. Oracle
  • All Hints for Oracle Databases Oracle
  • MYSQL for Oracle DBA MYSQL
  • Another export with Query Oracle
  • pvmehta.com SQL scripts
    Find which sessions is accessing object that prevent your session to have exclusive locks in Oracle Oracle
  • scripts to take listener.log backup Linux/Unix
  • DETERMINING WHICH INSTANCE OWNS WHICH SHARED MEMORY & SEMAPHORE SEGMENTS Oracle
  • To check whether standby is recovering properly or not?? Oracle
  • compile_inv.sql Oracle
  • Find average Row Length and other table size calculation. metalink notes Oracle

Implementation of key based authentications

Posted on 07-Oct-2005 By Admin No Comments on Implementation of key based authentications

*******************************************************************************************Step by Step Implementation of key based authentications from Source A to Destination B. *******************************************************************************************

(1) At source A

(1-A) Generate a Key

ssh-keygen -t dsa

Above command creates a public key file called : id_dsa.pub and private key called id_dsa

(1-B) Cat id_dsa.pub to the destination B and save as a file called authorized_keys for ssh1 or authorized_keys for ssh2 in the .ssh directory of that login-id.

(2) At the source then create a file called config with the foll contents

Host

User

Compression yes

Protocol 2

RSAAuthentication yes

StrictHostKeyChecking no < could be set to yes for stricter checking, I havent tried this>

ForwardAgent yes

ForwardX11 yes

IdentityFile /opt/app/oracle/.ssh/id_dsa

Linux/Unix, shell

Post navigation

Previous Post: Find Command
Next Post: Roles and Stored Object behaviour

Related Posts

  • tar and untar a dolder with all its subfolder. Linux/Unix
  • Unix command for system configuration Linux/Unix
  • replace alphabets using sed Linux/Unix
  • cif crons Linux/Unix
  • Unix split command to split files Linux/Unix
  • catall.sh Linux/Unix

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Categories

  • Ansible (0)
  • AWS (2)
  • Azure (1)
  • Django (0)
  • GIT (1)
  • Linux/Unix (149)
  • MYSQL (5)
  • Oracle (393)
  • PHP/MYSQL/Wordpress (10)
  • POSTGRESQL (1)
  • Power-BI (0)
  • Python/PySpark (7)
  • RAC (17)
  • rman-dataguard (26)
  • shell (149)
  • SQL scripts (342)
  • SQL Server (6)
  • Uncategorized (0)
  • Videos (0)

Recent Posts

  • Complete Git Tutorial for Beginners25-Dec-2025
  • Postgres DB user and OS user.25-Dec-2025
  • Trace a SQL session from another session using ORADEBUG30-Sep-2025
  • SQL Server Vs Oracle Architecture difference25-Jul-2025
  • SQL Server: How to see historical transactions25-Jul-2025
  • SQL Server: How to see current transactions or requests25-Jul-2025
  • T-SQL Vs PL/SQL Syntax25-Jul-2025
  • Check SQL Server edition25-Jul-2025
  • Checking SQL Server Version25-Jul-2025
  • Oracle vs MYSQL Architecture differences (For DBAs)24-Jul-2025

Archives

  • 2025
  • 2024
  • 2023
  • 2010
  • 2009
  • 2008
  • 2007
  • 2006
  • 2005
  • Mutating Table Error while using database trigger Oracle
  • How to find pinned objects from shared pool. (pinned via dbms_shared_pool.keep) Oracle
  • TABLE SIZING WITH DB_BLOCK ARCHITECTURE Reference : Metalink note : 10640.1 Oracle
  • Changing the Global Database Name Oracle
  • Directory wise folder wise space usage Linux/Unix
  • To see how much time or progress of long transaction Oracle
  • db_status.sql Oracle
  • get_vmstat.ksh for Solaris Oracle

Copyright © 2026 pvmehta.com.

Powered by PressBook News WordPress theme