Step by Step guide to the configurations of iQSonar and SSH Keys.
Target Server
Locate the .ssh directory for the user you will use to scan the target server (If the directory doesn't exist for that user it will need to be created)
...
Existing Key
To copy the file use the following:
ssh-copy-id -i "filename" user@hostname
Warning |
---|
Permissions that are required are 600 for that authorized_keys |
...
file. |
iQSonar configuration
Navigate to locations > credentials
...
Note | ||
---|---|---|
| ||
The SSH Key is treated like a password and can't be retrieved from the UI once saved |
Generate a new key
Linux/UNIX
If you don't have an existing SSH key that you wish to use, generate one as follows:
- Open a terminal on your local computer and enter the following:
ssh-keygen -t rsa
- Set you username and password
Windows:
If you don't have an existing SSH key that you wish to use, generate one as follows:
...
Info |
---|
Related articles
Filter by label (Content by label) | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
...