Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 17 Next »

Step by Step guide to the configurations of iQSonar and SSH Keys.

Target Server

Locate the .ssh directory for the user you will use to scan the target server (If the directory doesn't exist for that user it will need to be created)

If the username is iQSonar, then the hidden folder .ssh will be located in /home/iQSonar/.ssh  typically on Linux/Unix hosts. 

Existing Key

To create you "authorized_keys" file you can copy the file from your local system using the following:

ssh-copy-id -i "filename" user@hostname

Permissions that are required are 600 for that authorized_keys file.

iQSonar configuration

Navigate to locations > credentials

  1. Set Credential Type to Unix Linux
  2. Select SSH Key
  3. Insert your Private Key
  4. Save and Close


Note

The SSH Key is treated like a password and can't be retrieved from the UI once saved




  • No labels