Preparing the SSH client on an AIXor Linuxhost

You can prepare the Secure Shell (SSH) client on an AIX or Linux host.

Ensure that you have an SSH client installed on your system:
IBMAIX operating systems
For IBMAIX 5L for POWER, versions 5.1, 5.2, 5.3, and AIX version 6.1 for IBM POWER architecture, you can obtain the OpenSSH client from the bonus packs, but you also must obtain its prerequisite, OpenSSL, from the IBMAIX toolbox for Linux applications for IBMPower Systems. For AIX 4.3.3, you can obtain the software from the AIX toolbox for Linux applications. You can also obtain the AIX installation images from IBM®developerWorks at the following website:

oss.software.ibm.com/developerworks/projects/openssh

Linux operating systems
The OpenSSH client is installed by default on most Linux distributions. If it is not installed on your system, consult your Linux installation documentation or visit the following website:

www.openssh.org/portable.html

The OpenSSH client can run on a variety of additional operating systems. For more information about the openSSH client, visit the following website:

www.openssh.org/portable.html

Authentication to the system generally requires the use of a password, but if there is no password you can use a key pair. Use these steps to set up an RSA key pair on the AIXor Linux host and the clustered system:

To authenticate using an SSH key, use the following command:
ssh -i full_path_to_key username@my_system
Where my_system is the name of the system IP, username@my_system is the user name that you also log into the system with, and full_path_to_key is the full path to the key file that was generated in the previous step. Authenticate to the system using a SVC_username and password. (If you require command-line access without using a password, SSH keys can be used.) The system determines which user is logging in from the key the user is using.
Note: You can omit -i full_path_to_key if you configure the SSH client to use the key file automatically.

If you use the Secure Shell (SSH) to log into the system, use the password defined for accessing the GUI. You can also use RSA-based private key authentication.

For more information, see Connecting to the CLI using OpenSSH.