SSH Authentication

The SSH Requestor supports the following authentication mechanisms:

  • Password - Username and password provided to log in.

  • Keyboard Interactive - Username and password, meant to represent user typing the password.

  • PEM Key - Standard SSH key authentication with private/public key pairs.

  • Kerberos - The SL1 system will acquire a Kerberos ticket to establish a connection.

Supported Credential Types

Below are the supported credential types of the SSH Requestor:

Authenticators

Configuring Linux Devices

If you wish to run commands as root using sudo run without entering the sudo password, you must add the following permission to the sudo config file /etc/sudoers:
<username> ALL=(ALL) NOPASSWD:<path_to_application>

Note

If you see the Sorry, you must have a tty to run sudo error message in your device logs, you will need to configure the Tty Requirement in /etc/sudoers, in order to collect hardware configuration information. To do so, add the following line to the sudo config file:
Defaults:<username> !requiretty

Note

To monitor Amazon Web Services Linux instances using a private key, the PEM key must include the lines BEGIN RSA PRIVATE KEY and END RSA PRIVATE KEY, as well as all preceding and following dashes on those lines.