Configuring key-based access

This procedure enables communication between the Resource Manager master host and the Service Impact server host.

  1. Log in to the Service Impact server host as root, or as a user with superuser privileges.
  2. Reset the password of user zenossimpact.
    passwd -uf zenossimpact
  3. Start a shell as user zenossimpact.
    su - zenossimpact
  4. Create a new password for user zenossimpact.
    passwd
    The passwd command prompts you for the new password.
  5. Create a directory and file to hold public keys.
    1. Create the directory.
      mkdir $HOME/.ssh
    2. Set the directory access permissions.
      chmod 700 $HOME/.ssh
    3. Create the file.
      touch $HOME/.ssh/authorized_keys
    4. Set the file access permissions.
      chmod 600 $HOME/.ssh/authorized_keys
  6. Log in to the Resource Manager master host as zenoss.
  7. Copy the zenoss user's public key to the Service Impact server host.
    1. Copy the public key of the zenoss user to the server host.
      Replace Impact-Host-FQDN with the fully-qualified domain name of the Service Impact server host:
      cat $HOME/.ssh/id_rsa.pub | ssh -l zenossimpact Impact-Host-FQDN \
         "cat - >> /home/zenossimpact/.ssh/authorized_keys"
      The ssh command prompts you to confirm the connection.
    2. Enter yes.
      The ssh command adds the Service Impact server host to the known hosts file of the zenoss user on the master host, and then prompts you for the password of the zenossimpact user on the Service Impact server host.
    3. Enter the password.
      The ssh command invokes cat on the Service Impact server host to append the public key of user zenoss to the authorized keys file of user zenossimpact.