Recently Viewed Topics
Path: System > Keys
Keys allow administrator users to use key-based authentication with a remote SecurityCenter (remote repository) or between a SecurityCenter and an LCE server. This also removes the need for SecurityCenter administrators to know the administrator login or password of the remote system.
Note: The public key from the local SecurityCenter must be added to the Keys section of the SecurityCenter from which you wish to retrieve a repository. If the keys are not added properly, the remote repository add process prompts for the root username and password of the remote host to perform a key exchange before the repository add/sync occurs.
Remote LCE Key Exchange
A manual key exchange between the SecurityCenter and the LCE is normally not required; however, in some cases where remote root login is prohibited or key exchange debugging is required, you must manually exchange the keys.
For the remote LCE to recognize the SecurityCenter, you need to copy the SSH public key of the SecurityCenter and append it to the
/opt/lce/.ssh/authorized_keys file. The
/opt/lce/daemons/lce-install-key.sh script performs this function. For more information, see Manual LCE Key Exchange.