SSH Authentication
The SSH Requestor supports the following authentication mechanisms:
Password - Username and password provided to log in.
Keyboard Interactive - Username and password, meant to represent user typing the password.
PEM Key - Standard SSH key authentication with private/public key pairs.
Kerberos - The SL1 system will acquire a Kerberos ticket to establish a connection.
Supported Credential Types
Below are the supported credential types of the SSH Requestor:
- Fully Supported Credential Type
Authenticators
Configuring Linux Devices
If you wish to run commands as root using sudo run
without
entering the sudo password, you must add the following permission
to the sudo config file /etc/sudoers
:
<username> ALL=(ALL) NOPASSWD:<path_to_application>
Note
If you see the Sorry, you must have a tty to run sudo
error message
in your device logs, you will need to configure the Tty Requirement in
/etc/sudoers
, in order to collect hardware configuration information.
To do so, add the following line to the sudo config file:
Defaults:<username> !requiretty
Note
To monitor Amazon Web Services Linux instances using a private key,
the PEM key must include the lines BEGIN RSA PRIVATE KEY
and
END RSA PRIVATE KEY
, as well as all preceding and following
dashes on those lines.