Automation in the context of multifactor authentication: Difference between revisions

Jump to navigation Jump to search
no edit summary
No edit summary
No edit summary
Line 38: Line 38:
restrict,from="216.18.209.*",command="/cvmfs/soft.computecanada.ca/custom/bin/computecanada/allowed_commands/slurm_commands.sh" ssh-ed25519 AAAAC3NzaC1lZDI1NTE6AACAIExK9iTTDGsyqKKzduA46DvIJ9oFKZ/WN5memqG9Invw
restrict,from="216.18.209.*",command="/cvmfs/soft.computecanada.ca/custom/bin/computecanada/allowed_commands/slurm_commands.sh" ssh-ed25519 AAAAC3NzaC1lZDI1NTE6AACAIExK9iTTDGsyqKKzduA46DvIJ9oFKZ/WN5memqG9Invw
</pre>
</pre>
= Using the right key =
If you have multiple keys on your computer, you need to be careful to use the correct key. This is typically done by passing parameters to the command that you are using. Below are a few examples.
With <tt>ssh</tt> or <tt>scp</tt>:
{{Command|ssh -i .ssh/private_key_to_use ...}}
{{Command|scp -i .ssh/private_key_to_use ...}}
With <tt>rsync</tt>:
{{Command|rsync -e "ssh -i .ssh/private_key_to_use" ...}}
Bureaucrats, cc_docs_admin, cc_staff, rsnt_translations
2,837

edits

Navigation menu