5.1 Oracle用户下建立信任
5.11创建.ssh目录
[root@sgdb1 /]# su - oracle

[oracle@sgdb1 ~]$ mkdir .ssh       创建一个.ssh的隐藏目录
[oracle@sgdb1 ~]$ ls -al
total 44
-rw-r--r-- 1 oracle oinstall   33 Jul 12 17:05 .bash_logout
-rw-r--r-- 1 oracle oinstall  438 Jul 12 18:03 .bash_profile
drwxr-xr-x 4 oracle oinstall 4096 Jul 1217:05 .mozilla
drwx------ 2 oracle oinstall 4096 Jul 1218:05 .ssh
-rw------- 1 oracle oinstall  657 Jul 12 18:03 .viminfo
5.12 sgdb1生成密钥rsa类型
id_rsa为私钥,自动保存到.ssh下
id_rsa.pub为公钥,自动保存到.ssh下
[oracle@sgdb1 ~]$ ssh-keygen -t rsa

Generating public/private rsa key pair.
Enter file in which to save the key(/home/oracle/.ssh/id_rsa):  enter
Enter passphrase (empty for nopassphrase):  enter
Enter same passphrase again:  enter
Your identification has been saved in/home/oracle/.ssh/id_rsa.
Your public key has been saved in/home/oracle/.ssh/id_rsa.pub.           
The key fingerprint is:
64:a6:4a:77:db:33:a4:aa:6e:ca:8f:5f:2f:77:0f:40oracle@sgdb1
5.12 sgdb1生成密钥dsa类型
id_dsa为私钥,自动保存到.ssh下
id_dsa.pub为公钥,自动保存到.ssh下
[oracle@sgdb1 ~]$ ssh-keygen -t dsa

Generating public/private dsa key pair.
Enter file in which to save the key(/home/oracle/.ssh/id_dsa): enter                        
Enter passphrase (empty for no passphrase):enter
Enter same passphrase again: enter
Your identification has been saved in/home/oracle/.ssh/id_dsa.
Your public key has been saved in/home/oracle/.ssh/id_dsa.pub.                
The key fingerprint is:
7c:41:b5:0f:81:06:ad:30:07:4f:8b:1a:9b:94:68:14oracle@sgdb1
5.13 sgdb2生成密钥rsa类型
id_rsa为私钥,自动保存到.ssh下
id_rsa.pub为公钥,自动保存到.ssh下
 [oracle@sgdb2 asm]# su - oracle

[oracle@sgdb2 ~]$ mkdir .ssh
[oracle@sgdb2 ~]$ ssh-keygen -t rsa      
Generating public/private rsa key pair.
Enter file in which to save the key(/home/oracle/.ssh/id_rsa):  enter             
Enter passphrase (empty for nopassphrase):  enter
Enter same passphrase again:  enter
Your identification has been saved in/home/oracle/.ssh/id_rsa.
Your public key has been saved in/home/oracle/.ssh/id_rsa.pub.           
The key fingerprint is:
64:a6:4a:77:db:33:a4:aa:6e:ca:8f:5f:2f:77:0f:40oracle@sgdb1
5.14 sgdb2生成密钥dsa类型
id_dsa为私钥,自动保存到.ssh下
id_dsa.pub为公钥,自动保存到.ssh下
 [oracle@sgdb2 ~]$ ssh-keygen -tdsa

Generatingpublic/private dsa key pair.
Enter file inwhich to save the key (/home/oracle/.ssh/id_dsa): enter                        
Enter passphrase(empty for no passphrase): enter
Enter samepassphrase again: enter
Youridentification has been saved in /home/oracle/.ssh/id_dsa.
Your public keyhas been saved in /home/oracle/.ssh/id_dsa.pub.                
The keyfingerprint is:
7c:41:b5:0f:81:06:ad:30:07:4f:8b:1a:9b:94:68:14oracle@sgdb1
5.16 sgdb1配置信任
rsa和dsa为私钥,.pub的为公钥 
ssh下文件authorized_keys是专门存储公钥信息的
把rsa、dsa类型的公钥文件都放入到authorized_keys文件里
下操作
的authorized_keys文件里
[oracle@sgdb1 ~]$ ls .ssh

id_dsa       id_rsa             id_dsa.pub   id_rsa.pub     
[oracle@sgdb1 ~]$ cat.ssh/id_rsa.pub >>.ssh/authorized_keys
[oracle@sgdb1 ~]$ cat.ssh/id_dsa.pub >>.ssh/authorized_keys
[oracle@sgdb1 ~]$ ssh sgdb2  cat .ssh/id_rsa.pub>>.ssh/authorized_keys
oracle@sgdb2's password:
[oracle@sgdb1 ~]$ ssh sgdb2  cat .ssh/id_dsa.pub>>.ssh/authorized_keys
oracle@sgdb2's password:  oracle的密码
5.17 sgdb2配置信任
可以把sgdb1中的authorized_keys(密钥文件)复制到sgdb2中
[oracle@sgdb1 ~]$ scp.ssh/authorized_keys   sgdb2:~/.ssh

oracle@sgdb2's password: oracle的密码
5.18 sgdb1上验证信任
[oracle@sgdb1 ~]$ ssh sgdb2 date

[oracle@sgdb1 ~]$ ssh sgdb 2-privdate     //私有ip地址验证
[oracle@sgdb1 ~]$ ssh sgdb 1date
[oracle@sgdb1 ~]$ ssh sgdb 1-privdate    
5.19 sgdb2上验证信任
[oracle@sgdb2 ~]$ ssh sgdb1 date

[oracle@sgdb2~]$ ssh sgdb 1-priv date    
[oracle@sgdb2 ~]$ ssh sgdb2 date
[oracle@sgdb2~]$ ssh sgdb2-priv date    
5.2 Grid 用户下建立信任
步骤同oracle 一样,可参考oracle用户下设置
5.21创建.ssh目录
在grid用户下操作:
[root@sgdb1 /]# su– grid

[grid@sgdb1 ~]$mkdir .ssh       创建一个.ssh的隐藏目录
[grid@sgdb1 ~]$ ls-al
5.22 sgdb1生成密钥rsa类型
id_rsa为私钥,自动保存到.ssh下
id_rsa.pub为公钥,自动保存到.ssh下
[grid@sgdb1 ~]$ ssh-keygen-t rsa

Generating public/private rsa key pair.
Enter file in which to save the key(/home/oracle/.ssh/id_rsa):  enter             
Enter passphrase (empty for no passphrase):  enter
Enter same passphrase again:  enter
Your identification has been saved in/home/oracle/.ssh/id_rsa.
Your public key has been saved in/home/oracle/.ssh/id_rsa.pub.           
The key fingerprint is:
64:a6:4a:77:db:33:a4:aa:6e:ca:8f:5f:2f:77:0f:40oracle@sgdb1
5.23 sgdb1生成密钥dsa类型
id_dsa为私钥,自动保存到.ssh下
id_dsa.pub为公钥,自动保存到.ssh下
  [grid@sgdb1 ~]$ ssh-keygen-t dsa

Generating public/private dsa key pair.
Enter file in which to save the key(/home/oracle/.ssh/id_dsa): enter                        
Enter passphrase (empty for no passphrase): enter
Enter same passphrase again: enter
Your identification has been saved in/home/oracle/.ssh/id_dsa.
Your public key has been saved in/home/oracle/.ssh/id_dsa.pub.                
The key fingerprint is:
7c:41:b5:0f:81:06:ad:30:07:4f:8b:1a:9b:94:68:14oracle@sgdb1
5.24 sgdb2生成密钥rsa类型
id_rsa为私钥,自动保存到.ssh下
id_rsa.pub为公钥,自动保存到.ssh下
 [root@sgdb2 ~]# su – grid

[grid@sgdb2 ~]$ mkdir .ssh
[grid@sgdb2 ~]$ ssh-keygen-t rsa     
Generating public/private rsa key pair.
Enter file in which to save the key(/home/oracle/.ssh/id_rsa):  enter             
Enter passphrase (empty for no passphrase):  enter
Enter same passphrase again:  enter
Your identification has been saved in/home/oracle/.ssh/id_rsa.
Your public key has been saved in/home/oracle/.ssh/id_rsa.pub.           
The key fingerprint is:
64:a6:4a:77:db:33:a4:aa:6e:ca:8f:5f:2f:77:0f:40oracle@sgdb1
5.25 sgdb2生成密钥dsa类型
id_dsa为私钥,自动保存到.ssh下
id_dsa.pub为公钥,自动保存到.ssh下
[grid@sgdb2 ~]$ ssh-keygen -t dsa

Generating public/private dsa key pair.
Enter file in which to save the key(/home/oracle/.ssh/id_dsa): enter                        
Enter passphrase (empty for no passphrase): enter
Enter same passphrase again: enter
Your identification has been saved in/home/oracle/.ssh/id_dsa.
Your public key has been saved in/home/oracle/.ssh/id_dsa.pub.                
The key fingerprint is:
7c:41:b5:0f:81:06:ad:30:07:4f:8b:1a:9b:94:68:14oracle@sgdb1
5.26sgdb1配置信任
[grid@sgdb1 ~]$ ls .ssh

id_dsa       id_rsa             id_dsa.pub   id_rsa.pub      known_hosts
[grid@sgdb1 ~]$ cat.ssh/id_rsa.pub >>.ssh/authorized_keys
[grid@sgdb1 ~]$ cat.ssh/id_dsa.pub >>.ssh/authorized_keys
[grid@sgdb1 ~]$ ssh sgdb2  cat .ssh/id_rsa.pub>>.ssh/authorized_keys
grid@sgdb2's password:
[grid@sgdb1 ~]$ ssh sgdb2  cat .ssh/id_dsa.pub >>.ssh/authorized_keys
grid@sgdb2's password: grid的密码
5.27sgdb2配置信任
可以把sgdb1中的authorized_keys(密钥文件)复制到sgdb2中
[grid@sgdb1 ~]$ scp.ssh/authorized_keys   sgdb2:~/.ssh

grid@sgdb2's password: grid的密码
authorized_keys                             100% 1992     2.0KB/s  00:00 
5.28 sgdb1上验证信任
[grid@sgdb1 ~]$ ssh sgdb2 date

[grid@sgdb1 ~]$ ssh sgdb2-priv date    
[grid@sgdb1 ~]$ ssh sgdb1 date
[grid@sgdb1 ~]$ ssh sgdb 1-priv date    
5.29 sgdb2上验证信任
[grid@sgdb2 ~]$ ssh sgdb1 date

[grid@sgdb2~]$ ssh sgdb1-priv date    
[grid@sgdb2 ~]$ ssh sgdb2 date
[grid@sgdb2~]$ ssh sgdb2-priv date   
 

第5步:建立主机间的信任关系(sgdb1、sgdb2)的更多相关文章

  1. Solaris主机间的信任关系机制

    解决问题: 管理员经常在其他服务器之间登录,是否需要密码切换. 知识点:主机间信任关系.R 命令集 /etc/hosts/equiv 文件 R服务是不加密的,别人可以破解. 主机名 + 用户名. + ...

  2. Android手机与计算机间的”信任关系”

    在iDevices(如iPhone.iPad等等)的取证方面,那个代表”信任关系”的plist无疑是最为关键的迹证,只要有了它,哪怕是最新机型的iDevice及最新版的iOS,且有着指纹保护或pass ...

  3. [域|Domain] The trust relationship between this workstation and the primary domain failed 此工作站和主域间的信任关系失败

    PS> $cred = Get-Credential domain.sample.com;Reset-ComputerMachinePassword -Credential $cred -Ser ...

  4. ssh两台机器建立信任关系无密码登陆

    在建立信任关系之前先看看基于公钥.私钥的加密和认证. 私钥签名过程 消息-->[私钥]-->签名-->[公钥]-->认证 私钥数字签名,公钥验证 Alice生成公钥和私钥,并将 ...

  5. centos下建立双机信任关系

    在有些情况下,我们希望在两台centos机器之间建立ssh连接的时候,可以不用输入密码.最常见的情况就是在使用脚本做数据库备份的时候.这种情况下,我们可以通过公钥/私钥来建立双机之间的信任关系. 网上 ...

  6. 【Linux学习笔记】用nc实现两台主机间的文件传输(不需要输密码)

    通常,可以用scp完成两台主机间的文件传输任务,但在主机间未建立信任关系的情况下,scp每次都需要输入密码,用起来感觉不是很方便,之前这篇笔记介绍过不用输入密码执行脚本或传输文件的方法,但对于一些临时 ...

  7. linux机器间建立信任关系

    linux机器间建立信任关系 如何建立信任关系 在shell脚本中,需要使用scp命令将本地的文件复制到另一台机器中备份.但通常执行scp命令后都需要输入用户密码,这样在定时自动执行shell脚本中就 ...

  8. linux建立信任关系

    (1).切换到需要建立信任关系的用户(2).执行命令:ssh-keygen  -d,然后一直回车.该命令会在用户home目录下生成一个隐藏的.ssh目录.目录里面有两个文件:id_dsa.id_dsa ...

  9. 建立SSH的信任关系

    1.在Client上root用户执行ssh-keygen命令,生成建立安全信任关系的证书.  Client端 # ssh-keygen -t rsa Generating public/private ...

随机推荐

  1. javascript闭包传参就这么简单

    var query = (function (a) { return a; })('fx'); alert(query);

  2. 操作系统开发之——一个简单的Bootsect

    先吓唬一下读者朋友呵呵,直接发代码:(这是UOS操作系统的Bootsect)(有兴趣的朋友能够增加我们,联系方式在最后) ;------------------------------ ;文件名称:B ...

  3. 关于android-support-v4.jar包的错误

    1.加入android-support-v4 误 java.lang.ClassNotFoundException: android.support.v4.view.ViewPager in load ...

  4. 运行maven pom.xml文件后编译环境变为jdk1.5

    idea中运行pom.xml文件后,将编译环境变成了1.5,造成一系列的编译问题很是不方便. 以下是解决方法: 在"pom.xml"里加入如下代码: <properties& ...

  5. vue1.0 的过滤器

    vue1.0  自带的过滤器: 一 .过滤器写法 {{ message | Filter}} 二. Vue自带的过滤器:capitalize 功能:首字母大写 <!DOCTYPE html> ...

  6. C# 重载和默认参数(那种情况下使用更好)

    当你提供函数,外部因为要传入不同参数个数,重载会导致 外部if增加,  默认参数可以消除外部的if.当外部调用函数需要判断调用那个函数,根据调用次数增多 if跟着调用持续增多两种不同的调用 //重载 ...

  7. Java集合-Map接口相关操作方法

    Map接口不是Collection接口的继承.Map接口用于维护键/值对(key/value pairs). 该接口描述了从不重复的键到值的映射. (1) 添加.删除操作: Object put(Ob ...

  8. Hibernate的批量操作

    在实际的操作中,会经常的遇到批量的操作,使用hibernate将 100条记录插入到数据库的一个很自然的做法可能是这样的 Session session = sessionFactory.openSe ...

  9. Git使用总结 Asp.net生命周期与Http协议 托管代码与非托管代码的区别 通过IEnumerable接口遍历数据 依赖注入与控制反转 C#多线程——优先级 AutoFac容器初步 C#特性详解 C#特性详解 WPF 可触摸移动的ScrollViewer控件 .NET(C#)能开发出什么样的APP?盘点那些通过Smobiler开发的移动应用

    一,原理 首先,我们要明白Git是什么,它是一个管理工具或软件,用来管理什么的呢?当然是在软件开发过程中管理软件或者文件的不同版本的工具,一些作家也可以用这个管理自己创作的文本文件,由Linus开发的 ...

  10. 从构建分布式秒杀系统聊聊验证码 给大家推荐8个SpringBoot精选项目

    前言 为了拦截大部分请求,秒杀案例前端引入了验证码.淘宝上很多人吐槽,等输入完秒杀活动结束了,对,结束了...... 当然了,验证码的真正作用是,有效拦截刷单操作,让羊毛党空手而归. 验证码 那么到底 ...