![]() The name of the Vault user running this command. ![]() This is an optional parameter and must be specified when SSH key authentication is used.įor more information about this parameter and the different ways to specify private SSH keys, refer to SSH documentation.įor information about SSH key authentication to the Vault, refer to Authenticate to the Vault through PSM for SSH using a Private SSH Key.Ī standard SSH parameter that enables port forwarding setup (SSH tunneling). The path of the file from which the private key for SSH key authentication is read. The following table explains the parameters used in option 1, above.ĭisplays the terminal of the target machine on the user's local screen. If your administrator set the InstallCyberArkSSHD parameter to Integrated during the PSM for SSH installation, the following authentication methods are only supported when SSHD 7.8 is used on the PSM for SSH machine: You can authenticate to the Vault through PSM for SSH using the following methods:įor information about configuring authentication methods that will be available for PSM for SSH connections in your environment, refer to Authentication Methods ![]() You require the Use accounts and List accounts permissions in the Safe to connect transparently to remote machines. The Privileged Session Manager for SSH ( PSM for SSH) enables you to connect to remote SSH systems and devices with a native user experience through any SSH client, such as plink, PuTTY, SecureCrt. This topic describes transparent connections to SSH target systems through PSM for SSH.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |