Secure Shell (SSH) in HP Systems Insight Manager 5.1 and 5.2

Secure Shell (SSH) in HP SIM 5.
1
and 5.2
How this paper is organized
................................
................................
................................
.................
Introduction
................................
................................
................................
................................
.........
Why SSH?
................................
................................
................................
................................
......
Origins of SSH
................................
................................
................................
................................
Origins of OpenSSH
................................
................................
................................
........................
Wh
at is SSH
................................
................................
................................
................................
....
Other SSH implementations
................................
................................
................................
...............
Reference
................................
................................
................................
................................
........
How does SSH
work?
................................
................................
................................
..........................
The SSH connection process
................................
................................
................................
..............
SSH authentication mechanisms
................................
................................
................................
.........
Server authentication
verification of the SSH server system
................................
................................
...
User Authentication
-
verification of the client user’s credentials
................................
..........................
SSH Server on Windows
differences
................................
................................
................................
Cygwin mounts
................................
................................
................................
............................
Passwd and group for Windows Implementations
................................
................................
............
SSH and HP SIM
................................
................................
................................
................................
.
Which HP SIM features use SSH?
................................
................................
................................
......
SSH Bypass
................................
................................
................................
................................
.
How does HP SIM use SSH?
................................
................................
................................
............
10
Managed system authentication
................................
................................
................................
.......
10
User authentication
................................
................................
................................
.........................
11
Renamed or disabled ‘Administrator’ account
................................
................................
................
12
Configuration steps
................................
................................
................................
........................
13
Configuration Options
................................
................................
................................
................
14
SSH files
................................
................................
................................
................................
.......
14
Directory location of various SSH files
................................
................................
...........................
15
Known_hosts
................................
................................
................................
..............................
15
Client Public Key Authentication
................................
................................
................................
...
16
Host
-
Based Authentication
................................
................................
................................
...........
16
Passwd and group files
................................
................................
................................
...............
16
HP SIM commands and tools
................................
................................
................................
...........
17

Summary of content (39 pages)