About the SSH host key fingerprint
While creating one of the following data collectors, you need to provide an SSH host key fingerprint:
A host key fingerprint is also known as RSA key, host key, and key fingerprint.
Every SSH server is configured to use a host key to verify that the client is connecting to the correct host. The SSH server administrator provides the host key fingerprint to the various clients. The clients are expected to manually verify the host key while connecting to the server using any SSH client.
Example of a typical host key fingerprint
97:3c:ae:76:73:f3:ef:a7:18:02:6a:c6:57:43:82:f6
Finding the host key fingerprint
The following tables lists various ways to find to the host key fingerprint that you will need to provide as an input when you are creating a data collector:
Option | Description |
---|---|
1 | Get the fingerprint from the SSH server administrator. This is the most reliable way to get the correct host key fingerprint. |
2 | As an SSH server administrator, use the following steps to find the host key fingerprint on a Linux computer:
|
3 | Use the following steps to procure the host key fingerprint:
|
Comments
Log in or register to comment.