Using the Centralized SSH2-key based root access method to automate network inventory

Leveraging Centralized SSH2 based trusts to monitor network interface status on solaris servers Since SSH2 key-based trusts have been established in this landscape (at root level), the automation of a variety of tasks becomes easily achievable. The SSH2 key-based trust ensures secure and encrypted transport mechanism (that reinforces security-oriented approach to system administration). Leveraging tools …

Using the Centralized SSH2-key based root access method to automate network inventory Read More »