To use Secure Shell (SSH) public/private key as an authentication method to access remote installation targets, you must first install the public key of a public/private key pair on installation targets. You can then securely connect to installation targets by using the corresponding private key.
ps -e | grep sshdAdditionally, you must know the location of the SSH public key file on the deployment manager, and the administrative ID and password for the installation target. You use the same administrative ID and password to later install or uninstall software packages on the same installation target.
With the centralized installation manager, you can install product packages and maintenance for distributed platforms directly from the administrative console. AIX®, HP-UX, Solaris, and Linux operating systems generally support the use of SSH protocol. For Windows operating systems, however, you might have to install software from an independent software vendor to use SSH protocol. See Running Cygwin as root to use SSH on target Windows operating systems for more information.
To use the SSH public/private key authentication method to communicate with installation targets, first install the SSH public key.
You successfully installed the SSH public key on specific installation targets.
You can install the same SSH public key on other installation targets. You can also use the user ID that you specified in the preceding steps to install fix packs and interim fixes. In the administrative console, click
.