HP

HP Systems Insight Manager Technical Reference Guide

English
  Administering Systems and Events  |  Managing SSH Keys  |  Configuring SSH Key Security   

Configuring SSH Key Security

»Table of Contents
»Index
»Notices
»Introduction
»Product Overview
»Getting Started
»Discovery and Identification
»Users and Authorizations
»Networking and Security
»Monitoring Systems, Clusters, and Events
»Storage Integration
»Managing with Tasks
»Tools that Extend Management
»Partner Applications
»Reporting
»Administering Systems and Events
»Events
»Examples of Event Tasks
»Status Polling
»WMI Mapper Proxy
»Protocols
»Data Collection
»System Properties
»Version Control Repository
»PMP Administrative Options
»Setting Up Managed Systems
»Managing SSH Keys
Configuring SSH Key Security
»Importing an SSH Key
»Exporting an SSH Key
»Deleting an SSH Key
»Backing Up and Restoring the Database
»Configuring SSH Bypass Properties
»Audit Log
»Troubleshooting
»Reference Information
»Printable version
»Glossary
»Using Help
» Related Procedures
» Related Topic

Configuring the Secure Shell (SSH) key security level enables you to specify the level of security on the central management server (CMS).

To configure the SSH key security level on the CMS:

  1. Select OptionsSecuritySSH Keys. The SSH Keys page appears.

    Under Select managed systems SSH public key behavior, the following options are available:

    • The central management server saves the key sent the first time an SSH connection is made.

    • The central management server accepts an SSH connection with any key, even if not in the list below.

      This option is selected by default.

      This option causes all connections to the host to be accepted, even when the SSH key has changed. The known_hosts file is disabled and updated to reflect the new key.

      Note: This option provides no protection against man-in-middle attacks.

    • The central management server accepts an SSH connection only if the key is in the list below

      This option requires the SSH key to appear in the Managed Systems SSH Public Keys list.

      Note: HP recommends this option because it is the most secure.

  2. Click [OK]. The setting is saved.

Related Procedures

» Managing SSH Keys - Importing an SSH Key
» Managing SSH Keys - Exporting an SSH Key
» Managing SSH Keys - Deleting an SSH Key

Related Topic

» Administering Systems and Events - Managing SSH Keys