This documentation supports the 11.1 version of BMC Discovery.

To view an earlier version of the product, select the version from the Product version menu.

Using SSH Keys

You can attach an SSH key to any credential that uses the SSH access method. You can attach an SSH key when you add or edit a credential. See SSH credential type in Adding device credentials for more information.

BMC Atrium Discovery supports only RSA2 and DSA private keys for certificate-based authentication. For hosts that only support SSH v1, you must use credentials for authentication.

When using SSH keys, the appliance must identify itself to discovery targets so must use the private key. It is strongly recommended that you protect the private key with a strong passphrase. When they are uploaded to the appliance, the key and the passphrase are stored in the credential vault.

If the attempted login is unsuccessful using the SSH key, the credential falls back and attempts to login using the configured username and password.

It is important to configure a user name and password even when an SSH key is to be used. When privileged command execution is required, that password is used in the command, for example sudo password command.

After the key is stored in the credential vault, it is encrypted and cannot be recovered from the vault. You are strongly recommended to keep copies of private keys in secure storage according to your local security guidelines.

Was this page helpful? Yes No Submitting... Thank you