20.11 SECURE SHELL (SSH) FOR HP-UXSecure Shell (SSH) is a client/server application that enables secure communications for login file transfers and remote command execution between distributed computer systems. SSH uses public-key encryption for authentication. The basic authentication model for public-key encryption was described in Sections 20.8.1 and 20.8.2 of this chapter. The overall five-step ssh authentication process is outlined here for reference: 20.11.1 General Installation and ConfigurationResources that provide details on the installation of secure shell programs are provided in Appendix C. The OVO Administrator will require remote access privileges on the client and the server or work with the UNIX system administrator of the managed node to configure the ssh client components.Obtain a version of ssh authorized for use within the United StatesUnpack and install the softwareEdit the secure shell daemon startup configuration filesGenerate the security keysDistribute the public key to the remote systemsAdd the path to the ssh client program to your PATHTest your connection 20.11.2 OVO Agent Installation Using SSHOpenView supports use of SSH for installation of the agent software on the managed nodes. Update existing nodes to enable the secure shell installation method with the SSH update utility itosshupdate. After the decision is made to use the secure shell for agent distribution, modify the managed node configuration to support the new secure shell policy. Edit the node configuration by selecting Actions |