Veritas Storage Foundation™ and High Availability Solutions 5.0.1 Getting Started Guide

8
To begin the ssh session on the target system (system2 in this example), type
the following command on system1:
system1 # ssh system2
Enter the root password of system2 at the prompt:
password:
9
After you log in to system2, enter the following command to append the
id_dsa.pub file to the authorization key file:
system2 # cat /id_dsa.pub >> /.ssh/authorized_keys
10
After the id_dsa.pub public key file is copied to the target system (system2),
and added to the authorized keys file, delete it. To delete the id_dsa.pub
public key file, type the following command on system2:
system2 # rm /id_dsa.pub
11
To log out of the ssh session, type the following command:
system2 # exit
12
When you install from a source system that is also an installation target, also
add the local system id_dsa.pub key to the local authorized_keys file. The
installation can fail if the installation source system is not authenticated.
To add the local system id_dsa.pub key to the local authorized_keys file,
enter the following command:
system1 # cat /.ssh/id_dsa.pub >> /.ssh/authorized_keys
13
Run the following commands on the source installation system. If your ssh
session has expired or terminated, you can also run these commands to renew
the session. These commands bring the private key into the shell environment
and make the key globally available for the user root:
system1 # exec /usr/bin/ssh-agent $SHELL
system1 # ssh-add
Identity added: //.ssh/id_dsa
This shell-specific step is valid only while the shell is active. You must execute
the procedure again if you close the shell during the session.
27Installation overview
Configuring secure shell (ssh) or remote shell before installing products