|
At the moment of the publication of this documentation, using the natively provided SSH utilities by Windows OS environments doesn’t work. The main reason for this is significant issues with file transfers not working correctly across nodes. We have discovered that when SSH is provided using a Cygwin-based OpenSSH and Bash shell from Cygwin is used to manage Payara Server, remote nodes can be created and operated without issues. Until the problems with natively provided OpenSSH implementation are addressed, we recommend you configure SSH nodes using the Cygwin-based OpenSSH toolset in production environments. |
Payara Server uses the secure shell (SSH) to ensure that instances that span multiple hosts can be administered centrally.
To perform administrative operations on Payara Server instances that are remote from the domain administration server (DAS), the DAS must be able to communicate with those instances.
If an instance is running, the DAS connects to the running instance directly. For example, when you deploy an application to an instance, the DAS connects to the instance and deploys the application to the instance.
However, the DAS cannot connect to an instance to perform operations on an instance that is not running, such as creating or starting the instance.
For these operations, the DAS uses SSH to contact a remote host and administer instances there. SSH provides confidentiality and security for data that is exchanged between the DAS and remote hosts.
About Centralized Administration of Payara Server Instances
The use of SSH to enable centralized administration of remote instances is optional and is required only for specific operations. Instances local to the DAS can be administered without SSH. If SSH is not a possibility in your environment, you can administer remote instances locally instead.
Determining Whether to Enable Centralized Administration
Before setting up a Payara Server cluster or deployment group, use the following considerations to determine whether to enable centralized administration of remote instances:
-
If you are planning to set up a large cluster or deployment group of many instances, consider enabling centralized administration of their corresponding instances.
Centralized administration of instances simplifies the administration of the Deployment Groups by enabling you to perform all administrative operations on the Deployment Groups and its instances from the DAS.
-
If you are planning a small Deployment Groups of few instances, consider whether enabling centralized administration requires more effort than logging in to individual hosts to administer remote instances locally.
How you administer instances and the nodes on which they reside varies depending on whether and how centralized administration is enabled. The following table provides cross-references to instructions for administering nodes and instances depending on the protocol that is used for enabling centralized administration, if any.
| Protocol | Node Administration Instructions | Instance Administration Instructions |
|---|---|---|
SSH |
||
None |
Considerations for Using SSH for Centralized Administration
In a typical Payara Server deployment, the DAS acts as the SSH client, and hosts where instances reside act as SSH servers. The SSH Server Daemon sshd must be running on hosts where instances reside, but is not required to be running on the DAS host.
The DAS uses its own SSH client for communicating with hosts where instances reside. However, to generate keys and test SSH setup, a native SSH client must be installed on the DAS host.
The requirements for SSH configuration and user management are different for each operating system on which Payara Server is supported. Therefore, the use of SSH for centralized administration involves using SSH tools to configure SSH on the operating system that you are using.
On UNIX and Linux systems, SSH is typically installed and preconfigured, and requires minimal additional setup. On Windows systems, additional setup is required to install and configure an SSH provider.
Obtaining SSH Software
On UNIX and Linux systems, SSH software is typically installed as part of the base operating system.
However, on Windows systems, you must install one of the following SSH providers:
Determining the SSH User
Before setting up SSH, decide which SSH user Payara Server will use when connecting to remote hosts. For the following reasons, administration is simplest if the SSH user is the user that starts the DAS:
-
For public key authentication, the user that starts the DAS must be able to read the SSH user’s private key file.
-
Remote instances are started as the SSH user.
-
By default, the DAS assumes that the SSH user is the user that is running the DAS.
Requirements for the SSH User’s Environment
The SSH user’s environment on a host is set by the environment set-up files that are run when the user uses SSH to run a command on the host. You must ensure that these files set up the SSH user’s environment correctly.
The files that are run when the user uses SSH to run a command are different from the files that are run when the user logs in to a host. For example, in the bash shell, .profile and .bashrc are run when the user logs in, but only .bashrc is run when the user runs a command.
Therefore, in the bash shell, you must ensure that .bashrc contains the required environment settings for the SSH user.
File Access Permissions on UAC-Enabled Windows Systems
The User
Account Control (UAC) (http://technet.microsoft.com/en-us/library/cc709691%28WS.10%29.aspx) feature is available only on older versions of the Windows operating system( like Windows 7, Windows Vista, and Windows Server 2008).
|
You might be using a UAC-enabled Windows system and choose to store files for Payara Server instances in a directory other than the SSH user’s home directory. In this situation, the SSH user must have native (that is, non-virtual) read and write access to the file system where the instances are to be stored. The OS-level administrator has such access by default.
You can also configure the system to grant such access to other users. For more information, see the documentation for the Windows operating system.
Setting Up Cygwin SSH on Windows
Set up Cygwin SSH on the DAS host and on all hosts where instances in your Deployment Groups or clusters will reside.
Download and Install Cygwin
For centralized Payara Server administration, a basic Cygwin installation that includes the SSH client and the SSH server daemon sshd is sufficient. The default installation options are sufficient to create such a basic installation.
-
Log in as a user with Administrator privileges.
-
Create the
C:\cygwindirectory. -
From the Cygwin home page (
http://www.cygwin.com/), download and save thesetup.exefile to your desktop. -
Run the
setup.exefile. -
Select the default for the following options:
-
Install from Internet
-
Install Root Directory:
C:\cygwin -
Install for All Users
-
-
Specify a folder for the local package directory that is not the Cygwin root folder, for example,
C:\cygwin\packages. -
Specify the connection method.
For example, if the host is connected to the Internet through a proxy server, specify the proxy server.
-
Select the mirror site from which to download the software.
-
Select the
opensshpackage for installation. -
Under the Net category, search for
openssh. -
Locate the
opensshpackage and click Skip.The package is selected.
-
Click Next.
Any unsatisfied dependencies are listed.
-
Leave the Select Required Packages option selected and click Next
The packages are installed.
-
Click Finish.
See Also
For detailed information about installing Cygwin, see "Internet Setup" in Cygwin User’s Guide (http://cygwin.com/cygwin-ug-net/setup-net.html#internet-setup).
To Set the Path for Windows and for the Cygwin Shell
To enable Payara Server tools to find commands for SSH, each user’s path for Windows and for the Cygwin shell must contain the following directories:
-
The Cygwin
bindirectory, for exampleC:\cygwin\bin -
The
bindirectory of the JDK software-
Log in as a user with Administrator privileges.
Logging in as a user with Administrator privileges ensures that the change applies to all users.
-
In the System Information control panel, click Advanced → Environment Variables.
-
Add the following directories to the
PATHenvironment variable:
-
-
The Cygwin
bindirectory, for exampleC:\cygwin\bin -
The
bindirectory of the JDK software installation
To Set the Home Directory for the Cygwin SSH User
The SSH Server Daemon sshd locates a user’s home directory from the configuration in the user database, not from environment variables such as HOME. To ensure that all Payara Server commands can run without errors, each SSH user must be configured to have a home directory.
Each user on a Windows host where SSH is set up potentially has two home directories:
- Windows home directory
-
Payara Server commands, which are run in a Windows command window, use the Windows home directory.
- SSH home directory
-
SSH commands, which are run in a shell such as
bashorksh, use the SSH home directory.
If these home directories are different, Payara Server and SSH each locate a user’s .ssh directory in different directories.
To simplify the setup of SSH, configure each user’s home directory for SSH and Windows to be the same directory. A disadvantage of this approach is that the SSH home directory has spaces in its path name. Spaces in path names are cumbersome in the UNIX environment.
-
Log in as a user with Administrator privileges.
-
In the
c:\cygwin\etc\passwdfile, edit the home directory setting for the SSH user to specify the user’s home directory for Windows.
To Configure and Start the Cygwin SSH Server Daemon sshd
Before You Begin
Ensure that the following prerequisites are met:
-
A user account is created for each user that will log in to the host through SSH.
-
A password is set for each user account.
The SSH server daemon
sshddisallows authentication of any user for whose account a password is not set. . Double-click the Cygwin icon.+ A Cygwin terminal is started.
-
If necessary, set the password for your user account.
-
Run the
passwdcommand as follows:$ passwd user-name- user-name
-
The username for your account.
-
Type a password.
The password for your Windows account is also set.
-
-
Configure SSH on the host.
-
Run the
ssh-host-configcommand.$ ssh-host-configIf you are using Windows XP, specify the -yoption ofssh-host-configto answeryesto all prompts. If you runssh-host-configwith the-yoption, omit Step b. -
Ensure that the
StrictModesandPubkeyAuthenticationoptions are set toyesin the file/etc/ssh_config.The file
/etc/ssh_configcan also be accessed as/cygdrive/c/cygwin/etc/sshd_config.
-
-
Start the SSH server daemon
sshd.$ net start sshd -
Confirm that the SSH server daemon
sshdis running.$ cygrunsrv --query sshd Service : sshd Display name : CYGWIN sshd Current State : Running Controls Accepted : Stop Command : /usr/sbin/sshd -D
-
Next Steps
After you have completed the setup of SSH on a host, test the setup on the host as explained in Testing the SSH Setup on a Host.
Setting Up the MKS Toolkit on Windows
Set up the MKS Toolkit on the DAS host and on all hosts where instances in your Deployment Groups will reside.
To Install the MKS Toolkit
For centralized Payara Server administration, the default installation of the MKS Toolkit is sufficient.
Follow the instructions in the MKS Toolkit product documentation to install OpenSSH from the MKS Toolkit with default installation options.
See Also
For detailed information about installing MKS Toolkit, see "Installing MKS Toolkit" in the MKS Toolkit v9.4 Release Notes (http://www.mkssoftware.com/docs/rn/relnotes_tk94.asp#install).
To Set the Path for Windows and for the MKS Toolkit Shell
To enable Payara Server tools to find commands for SSH, each user’s path for Windows and for the MKS Toolkit shell must contain the following directories:
-
The MKS Toolkit
bindirectory, for exampleC:\Program Files\MKS Toolkit\mksnt -
The
bindirectory of the JDK software
The MKS Toolkit installer automatically adds the MKS Toolkit bin directory to the path. However, you must add the bin directory of the JDK software to the path yourself.
-
Log in as a user with Administrator privileges.
Logging in as a user with Administrator privileges ensures that the change applies to all users.
-
In the System Information control panel, click Advanced>Environment Variables.
-
Add the
bindirectory of the JDK software to the Path environment variable.
To Set the Home Directory for the MKS Toolkit SSH User
The SSH Server Daemon sshd locates a user’s home directory from the configuration in the user database, not from environment variables such as HOME. To ensure that all Payara Server commands can run without errors, each SSH user must be configured to have a home directory.
Each user on a Windows host where SSH is set up potentially has two home directories:
-
Windows home directory. Payara Server commands, which are run in a Windows command window, use the Windows home directory.
-
SSH home directory. SSH commands, which are run in a shell such as
bashorksh, use the SSH home directory.
If these home directories are different, Payara Server and SSH each locate a user’s .ssh directory in different directories. To simplify the setup of SSH, configure each user’s home directory for SSH and Windows to be the same directory.
A disadvantage of this approach is that the SSH home directory has spaces in its path name. Spaces in path names are cumbersome in a UNIX environment.
-
Compare the pairs of settings for Windows and the MKS Toolkit that are listed in the following table.
Windows Environment Variable MKS Toolkit Field HOMEPATHHome Directory
HOMEDRIVEHome Directory Drive
-
In a Windows command window, determine the values of the
HOMEPATHandHOMEDRIVEenvironment variables. -
In an MKS Toolkit shell, determine the current settings of the Home Directory and Home Directory Drive fields for the user.
$ userinfo user-name- user-name
-
The username for the user whose home directory you are setting, for example
Administrator.
-
-
If the settings do not match, update setting of each MKS Toolkit field to match its corresponding Windows environment variable.
If the settings match, no further action is required.
To update the settings, run the following command in an MKS Toolkit shell:
$ userinfo -u -fHomeDirDrive:"drive" -fHomeDir:"path" user-name- drive
-
The drive identifier of the disk drive on which the user’s Windows home directory resides, for example,
C:. - path
-
The path to the user’s Windows home directory, for example,
\Documents and Settings\Administrator. - user-name
-
The username for the user whose home directory you are setting, for example
Administrator.Do not set the HOMEenvironment variable explicitly. If the Home Directory and Home Directory Drive are set correctly, theHOMEenvironment variable specifies the correct path by default.
-
In an MKS Toolkit shell, confirm that the settings were updated.
$ userinfo user-name- user-name
-
The username for the user whose home directory you are setting, for example
Administrator.
-
Log out of the host and log in to the host again.
-
Confirm that the home directories are the same as explained in Step 1.
The following example sets the home directory for the MKS Toolkit user Administrator to C:\Documents and Settings\Administrator.
$ userinfo -u -fHomeDirDrive:"C:" -fHomeDir:"\Documents and Settings\Administrator" Administrator
To Configure and Start the MKS Toolkit SSH Server Daemon sshd
Do not set the command shell to cmd.exe. The use of SSH for centralized Payara Server administration requires a shell in the style of a UNIX shell.
|
-
From the Programs menu, choose MKS Toolkit → Configuration → Configuration Information.
-
Enable password authentication and strict modes.
-
Click the Secure Shell Service tab.
-
Select the Password Authentication option.
-
Click Advanced settings.
-
Click the Login tab.
-
Deselect the Strict Modes option.
-
-
If you are using SSH key-file authentication, enable
MKSAUTHpassword authentication.-
Click the Authentication tab.
-
Under Enable/Disable Password using
MKSAUTH, type the user’s password and click the Enable.
-
-
Start the SSH server daemon
sshd.-
Confirm that the SSH server daemon
sshdis running.$ service query MKSSecureSH Name: MKS Secure Shell Service Service Type: WIN32_OWN_PROCESS Current State: RUNNING Controls Accepted: ACCEPT_STOP Check Point: 0 Wait Hint: 0 Start Type: AUTO_START Error Control: IGNORE Path: "C:\Program Files\MKS Toolkit\bin\secshd.exe" Dependency: NuTCRACKERService Dependency: tcpip Service Start Name: LocalSystem
-
Next Steps
After you have completed the setup of SSH on a host, test the setup on the host as explained in Testing the SSH Setup on a Host.
Setting Up SSH on UNIX and Linux Systems
Setting up SSH on UNIX and Linux systems involves verifying that the SSH server daemon sshd is running and, if necessary, starting this daemon. Set up SSH on the DAS host and on all hosts where instances in your Deployment Groups will reside.
On UNIX and Linux systems, SSH software is typically installed as part of the base operating system. If SSH is not installed, download and install the appropriate OpenSSH (http://www.openssh.com/) SSH package for your operating system.
To Set Up SSH on Oracle Solaris Systems
-
Ensure that the following options in the configuration file
/etc/ssh/sshd_configare set toyes:-
StrictModes -
PubkeyAuthentication
-
-
Determine if the SSH server daemon
sshdis running.$ /usr/bin/svcs ssh -
If the SSH server daemon
sshdis not running, start this daemon.If the daemon is running, no further action is required.
$ /usr/sbin/svcadm enable ssh
The following example confirms that the SSH server daemon sshd is running on an Oracle Solaris system.
$ /usr/bin/svcs ssh
STATE STIME FMRI
online Jul_06 svc:/network/ssh:default
See Also
Next Steps
After you have completed the setup of SSH on a host, test the setup on the host as explained in Testing the SSH Setup on a Host.
To Set Up SSH on macOS Systems
-
Open System Preferences and click Sharing.
The Sharing window opens.
-
Ensure that Remote Login is selected in the Service list.
-
Ensure that either of the following is allowed access:
-
All Users
-
The user that running the DAS or instance
-
-
(macOS 10.6 systems only) Ensure that the SSH server daemon
sshdallows password authentication.On macOS 10.5 systems, the SSH server daemon
sshdallows password authentication by default. However, on macOS 10.6 systems, the SSH server daemonsshddisallows password authentication by default. .. Edit the configuration file/etc/sshd_configto set thePasswordAuthenticationoption toyes. .. Stop the SSH server daemonsshd.+
$ sudo launchctl stop com.openssh.sshd -
Start the SSH server daemon
sshd.$ sudo launchctl start com.openssh.sshd
Next Steps
After you have completed the setup of SSH on a host, test the setup on the host as explained in Testing the SSH Setup on a Host.
To Set Up SSH on Linux systems
-
Ensure that the following options in the configuration file
/etc/ssh/sshd_configare set toyes:-
StrictModes -
PubkeyAuthentication
-
-
Determine if the SSH server daemon
sshdis running.$ /sbin/service sshd status -
If the SSH server daemon
sshdis not running, start this daemon.If the daemon is running, no further action is required.
$ /sbin/service sshd start
This example confirms that the SSH server daemon sshd is running on a Linux system.
$ /sbin/service sshd status
openssh-daemon (pid 2373) is running...
Next Steps
After you have completed the setup of SSH on a host, test the setup on the host as explained in Testing the SSH Setup on a Host.
Testing the SSH Setup on a Host
After setting up SSH on a host, test the setup to ensure that you can use SSH to contact the host from another host. Testing the SSH setup on a host verifies that the SSH server daemon sshd is running and that the SSH user has a valid user account on the host.
If you cannot use SSH to contact the host, troubleshoot the SSH setup before setting up SSH user authentication.
To Test the SSH Setup on a Host
-
From another host, use SSH to log in into the host that you are testing as the SSH user.
$ ssh -l user-name host-name- user-name
-
The username for the SSH user’s account on the host.
- host-name
-
The host name of the host that you are logging in to.
-
In response to the prompt, type your password.
If this step succeeds, your setup of SSH is complete.
The first time that you connect to a host, you might be warned that the authenticity cannot be established and be asked if you want to continue connection. If you trust the host, answer
yesto connect to the host.
Troubleshooting
To obtain diagnostic information, use the -v option of the command-line SSH client and the -d option of the SSH server daemon sshd. How to start the SSH server daemon sshd manually depends on the operating system and SSH provider that you are using.
If the SSH server daemon sshd is set up on a host that has a firewall, ensure that a rule is defined to allow inbound traffic on the SSH port. The default SSH port is port 22.
If your connection is refused, the SSH server daemon sshd is not running, and you must start the daemon.
If your connection is accepted, but you cannot log in, ensure that the SSH user has a valid user account on the host.
Next Steps
After testing the SSH setup, set up SSH user authentication to enable SSH to authenticate users without prompting for a password. For more information, see Setting Up SSH User Authentication.
Setting Up SSH User Authentication
When a Payara Server subcommand uses SSH to log in to a remote host, Payara Server must be able to authenticate the SSH user. Setting up SSH user authentication ensures that this requirement is met.
Before setting up SSH user authentication, determine the authentication scheme to use. If SSH is already deployed at your site, the authentication scheme to use might already be chosen for you.
The following table lists the authentication schemes that Payara Server supports. The table also lists the advantages and disadvantages of each authentication scheme.
| Authentication Scheme | Advantages | Disadvantages |
|---|---|---|
Public key without encryption |
Payara Server provides tools to simplify set up. |
SSH must be configured to locate users' key files in the correct location. File access permissions for key files and the directory that contains the key files must be set correctly. |
Public key with passphrase-protected encryption |
This scheme is more secure than public key authentication without encryption. |
SSH must be configured to locate users' key files in the correct location. File access permissions for key files and the directory that contains the key files must be set correctly. For each SSH user, Payara Server password aliases are required for the encryption passphrase. |
Password |
No SSH configuration is required to locate key files or to ensure that file access permissions are correct. |
For each SSH user, Payara Server password aliases are required for the SSH password. |
To Set Up Public Key Authentication Without Encryption
Use the setup-ssh subcommand in local mode to set up public key authentication without encryption. This subcommand enables you to set up public key authentication on multiple hosts in a single operation.
The setup-ssh subcommand generates a key pair and distributes the public key file to specified hosts. The private key file and the public key file are protected only by the file system’s file access permissions.
If you require additional security, set up public key authentication with passphrase-protected encryption as explained in To Set Up Encrypted Public Key Authentication.
Before You Begin
Ensure that the following prerequisites are met:
-
SSH is set up on each host where you are setting up public key authentication. For more information, see the following sections:
-
Only the SSH user has write access to the following files and directories on each host where you are setting up public key authentication:
-
The SSH user’s home directory
-
The
~/.sshdirectory -
The
authorized_keyfile
-
If other users can write to these files and directories, the secure service might not trust the authorized_key file and might disallow public key authentication.
-
Generate an SSH key pair and distribute the public key file to the hosts where you are setting up public key authentication.
Only the options that are required to complete this task are provided in this step. For information about all the options for setting up an SSH key, see the setup-ssh(1) help page.asadmin> setup-ssh [--sshuser sshuser] host-list- sshuser
-
The SSH user for which you are generating the SSH key pair. If you are running the subcommand as the SSH user, you may omit this option.
- host-list
-
A space-separated list of the names of the hosts where the SSH public key is to be distributed.
After generating the SSH key pair, the subcommand uses SSH to log in to each host in host-list as the SSH user to distribute the public key. Each time a password is required to log in to a host, you are prompted for the SSH user’s password.
-
In response to each prompt for a password, type the SSH user’s password.
The following example generates and sets up an SSH key for the user gfuser on the hosts sua01 and sua02. The command is run by the user gfuser.
asadmin> setup-ssh --generatekey=true sua01 sua02
Enter SSH password for gfuser@sua01>
Created directory /home/gfuser/.ssh
/usr/bin/ssh-keygen successfully generated the identification /home/gfuser/.ssh/id_rsa
Copied keyfile /home/gfuser/.ssh/id_rsa.pub to gfuser@sua01
Successfully connected to gfuser@sua01 using keyfile /home/gfuser/.ssh/id_rsa
Copied keyfile /home/gfuser/.ssh/id_rsa.pub to gfuser@sua02
Successfully connected to gfuser@sua02 using keyfile /home/gfuser/.ssh/id_rsa
Command setup-ssh executed successfully.
Next Steps
After setting up public key authentication, test the setup by using ssh to log in as the SSH user to each host where the public key was distributed. For each host, log in first with the unqualified host name and then with the fully qualified name. If SSH does not prompt for password, public key authentication is set up correctly on the host.
If you are prompted for a password, verify that the public key file was copied correctly to the SSH user’s authorized_keys file.
Troubleshooting
Setup might fail because file access permissions in the SSH user’s home directory are too permissive. In this situation, ensure that the file access permissions in the SSH user’s home directory meet the requirements for performing this procedure.
If you have set the file access permissions in the SSH user’s home directory correctly, setup might still fail if you are using the MKS Toolkit. In this situation, correct the problem in one of the following ways:
-
On each remote host, copy the public key file to the SSH user’s
~/.sshdirectory and import the file. To import the file, select the Secure Service tab in the MKS configuration GUI and click Passwordless. -
Disable strict modes.
See Also
You can also view the full syntax and options of the subcommand by typing asadmin help setup-ssh at the command line.
To Set Up Encrypted Public Key Authentication
Encrypted key file authentication uses an encrypted private key file that is protected with a passphrase. This passphrase must be provided to use the private key to unlock the public key.
If you require encrypted public key authentication, you must use the SSH utility ssh-keygen to generate an SSH key pair with an encrypted private key. You can then use the setup-ssh subcommand to distribute the public key file to specified hosts.
To use the encrypted key file, Payara Server requires the passphrase with which the key file was encrypted. To provide this passphrase securely to Payara Server, create a Payara Server password alias to represent the passphrase and store this alias in a password file that is passed to the asadmin utility.
| Only the options that are required to complete this task are provided in each step. For information about all the options for the commands and subcommands in this task, see their help pages or man pages. |
Before You Begin
Ensure that the following prerequisites are met:
-
SSH is set up on each host where you are setting up public key authentication. For more information, see the following sections:
-
Only the SSH user has write access to the following files and directories on each host where you are setting up public key authentication:
-
The SSH user’s home directory
-
The
~/.sshdirectory -
The
authorized_keyfileIf other users can write to these files and directories, the secure service might not trust the
authorized_keyfile and might disallow public key authentication.-
Generate an SSH key pair with an encrypted private key file.
Use the SSH utility
ssh-keygenfor this purpose.$ ssh-keygen -t type- type
-
The algorithm that is to be used for the key and which must be
rsa,dsa, orrsa1.The
ssh-keygenutility prompts you for a file in which to save the key.
-
To simplify the distribution of the key file, accept the default file.
The
ssh-keygenutility prompts you for a passphrase. -
In response to the prompt, type your choice of passphrase for encrypting the private key file. The
ssh-keygenutility prompts you to type the passphrase again. -
In response to the prompt, type the passphrase that you set in Step 3.
-
Distribute the public key file to the hosts where you are setting up public key authentication.
Use the
setup-sshasadminsubcommand for this purpose.
-
-
$ asadmin setup-ssh --generatekey=false host-list
- host-list
-
A space-separated list of the names of the hosts where the SSH public key is to be distributed.
The subcommand uses SSH to log in to each host in host-list as the SSH user to distribute the public key. Each time a passphrase or a password is required to log in to a host, you are prompted for the passphrase or the SSH user’s password.
-
In response to each prompt, type the requested information.
-
In response to each prompt for a passphrase, type the passphrase that you set in Step 3.
-
In response to each prompt for a password, type the SSH user’s password.
-
-
Create a Payara Server password alias for the passphrase that you set in Step 3.
-
Ensure that the DAS is running.
Remote subcommands require a running server.
-
Run the
create-password-aliasasadminsubcommand.$ asadmin create-password-alias alias-name
-
-
- alias-name
-
Your choice of name for the alias that you are creating.
The
create-password-aliassubcommand prompts you to type the passphrase for which you are creating an alias. .. In response to the prompt, type the passphrase that you set in Step 3.+ The
create-password-aliassubcommand prompts you to type the passphrase again.-
In response to the prompt, type the passphrase that you set in Step 3 again.
-
Create a plain text file that contains the following entry for the passphrase alias:
AS_ADMIN_SSHKEYPASSPHRASE=${ALIAS=alias-name}
-
-
When you create an SSH node, pass this file as the --passwordfile option of the asadmin utility. For more information, see To Create an SSH Node.
|
The following example generates an SSH key pair with an encrypted private key for the user gfadmin and distributes the public key to the hosts sj01 and ja02. The example also creates an alias that is named ssh-key-passphrase for the private key’s passphrase.
$ ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/home/gfadmin/.ssh/id_rsa):
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/gfadmin/.ssh/id_rsa.
Your public key has been saved in /home/gfadmin/.ssh/id_rsa.pub.
The key fingerprint is:
db:b5:f6:0d:fe:16:33:91:20:64:90:1a:84:66:f5:d0 gfadmin@dashost
$ asadmin setup-ssh --generatekey=false sj01 sj02
Key /home/gfadmin/.ssh/id_rsa is encrypted
Enter key passphrase>
Enter SSH password for gfadmin@sj01>
Copied keyfile /home/gfadmin/.ssh/id_rsa.pub to gfadmin@sj01
Successfully connected to gfadmin@sj01 using keyfile /home/gfadmin/.ssh/id_rsa
Successfully connected to gfadmin@sj02 using keyfile /home/gfadmin/.ssh/id_rsa
SSH public key authentication is already configured for gfadmin@sj02
Command setup-ssh executed successfully.
$ asadmin create-password-alias ssh-key-passphrase
Enter the alias password>
Enter the alias password again>
Command create-password-alias executed successfully.
The entry in the password file for the ssh-key-passphrase alias is as follows:
AS_ADMIN_SSHKEYPASSPHRASE=${ALIAS=ssh-key-passphrase}
Troubleshooting
Setup might fail because file access permissions in the SSH user’s home directory are too permissive. In this situation, ensure that the file access permissions in the SSH user’s home directory meet the requirements for performing this procedure.
If you have set the file access permissions in the SSH user’s home directory correctly, setup might still fail if you are using the MKS Toolkit. In this situation, correct the problem in one of the following ways:
-
On each remote host, copy the public key file to the SSH user’s
~/.sshdirectory and import the file. To import the file, select the Secure Service tab in the MKS configuration GUI and click Passwordless. -
Disable strict modes.
You can also view the full syntax and options of the subcommands by typing the following commands at the command line:
-
asadmin help create-password-alias -
asadmin help setup-ssh
To Set Up Password Authentication
To use SSH to log in to a remote host, Payara Server requires the SSH user’s password. To provide this password securely to Payara Server, create a Payara Server password alias to represent the password and store this alias in a password file that is passed to the asadmin utility.
Before You Begin
Ensure that SSH is set up on each host where you are setting up password authentication.
-
Ensure that the DAS is running.
Remote subcommands require a running server.
-
Create an alias for the SSH user’s password.
Only the options that are required to complete this task are provided in this step. For information about all the options for creating a password alias, see the create-password-alias(1) help page.asadmin> create-password-alias alias-name- alias-name
-
Your choice of name for the alias that you are creating.
The
create-password-aliassubcommand prompts you to type the password for which you are creating an alias.
-
In response to the prompt, type the SSH user’s password.
The
create-password-aliassubcommand prompts you to type the password again. -
In response to the prompt, type the SSH user’s password again.
-
Create a plain text file that contains the following entry for the password alias:
AS_ADMIN_SSHPASSWORD=${ALIAS=alias-name}- alias-name
-
The alias name that you specified in Step 2.
When you create an SSHnode, pass this file as the--passwordfileoption of theasadminutility. For more information, see To Create anSSHNode.
The following example creates an alias that is named ssh-password for the SSH user’s password.
$ asadmin create-password-alias ssh-password
Enter the alias password>
Enter the alias password again>
Command create-password-alias executed successfully.
The entry in the password file for the ssh-password alias is as follows:
AS_ADMIN_SSHPASSWORD=${ALIAS=ssh-password}
See Also
You can also view the full syntax and options of the subcommand by typing asadmin help create-password-alias at the command line.
Installing and Removing Payara Server Software on Multiple Hosts
Payara Server software must be installed on all hosts where Payara Server will run. How to install Payara Server software on multiple hosts depends on the degree of control that you require over the installation on each host.
-
If you require complete control over the installation on each host, install the software from a Payara Server distribution on each host individually.
-
If the same setup on each host is acceptable, copy an existing Payara Server installation to the hosts. For more information, see To Copy a Payara Server Installation to Multiple Hosts.
Payara Server also enables you to remove Payara Server software from multiple hosts in a single operation. For more information, see To Remove Payara Server Software From Multiple Hosts.
To Copy a Payara Server Installation to Multiple Hosts
Use the install-node-ssh subcommand in local mode to copy an installation of Payara Server software to multiple hosts.
Before You Begin
Ensure that SSH is set up on the host where you are running the subcommand and on each host where you are copying the Payara Server software.
Run the appropriate subcommand for the protocol that is set up for communication between the hosts.
-
If SSH is set up for communication between the hosts, run the
install-node-sshsubcommand.Only the options that are required to complete this task are provided in this step. For information about all the options for copying an installation of Payara Server software, see the link install-node-ssh(1) help page.asadmin> install-node-ssh host-list- host-list
-
A space-separated list of the names of the hosts where you are copying the installation of Payara Server software.
The following example copies the Payara Server software on the host where the subcommand is run to the default location on the SSH-enabled hosts sj03.example.com and sj04.example.com.
asadmin> install-node-ssh sj03.example.com sj04.example.com
Created installation zip /home/gfuser/glassfish2339538623689073993.zip
Successfully connected to gfuser@sj03.example.com using keyfile /home/gfuser
/.ssh/id_rsa
Copying /home/gfuser/payara2339538623689073993.zip (81395008 bytes) to
sj03.example.com:/export/payara
Installing payara2339538623689073993.zip into sj03.example.com:/export/payara
Removing sj03.example.com:/export/payara/payara2339538623689073993.zip
Fixing file permissions of all files under sj03.example.com:/export/payara/bin
Successfully connected to gfuser@sj04.example.com using keyfile /home/gfuser
/.ssh/id_rsa
Copying /home/gfuser/payara2339538623689073993.zip (81395008 bytes) to
sj04.example.com:/export/payara
Installing payara2339538623689073993.zip into sj04.example.com:/export/payara
Removing sj04.example.com:/export/payara/payara2339538623689073993.zip
Fixing file permissions of all files under sj04.example.com:/export/payara/bin
Command install-node-ssh executed successfully
See Also
You can also view the full syntax and options of the subcommands by typing the following commands at the command line:
-
asadmin help install-node-ssh
To Remove Payara Server Software From Multiple Hosts
Use the uninstall-node-ssh subcommand in local mode to remove Payara Server software from multiple hosts.
Before You Begin
Ensure that the following prerequisites are met:
-
SSH is set up on the host where you are running the subcommand and on each host from which you are removing the Payara Server software.
-
No process is accessing the parent of the base installation directory for the Payara Server software or any subdirectory of this directory.
-
The parent of the base installation directory for the Payara Server software is the same on each host from which you are removing the Payara Server software.
-
For hosts that use SSH for remote communication, the configuration of the following items is the same on each host:
-
SSH port
-
SSH user
-
SSH key file
-
Run the appropriate subcommand for the protocol that is set up for communication between the hosts.
-
If SSH is set up for communication between the hosts, run the
uninstall-node-sshsubcommand.Only the options that are required to complete this task are provided in this step. For information about all the options for removing Payara Server software, see the uninstall-node-ssh(1) help page.
asadmin> uninstall-node-ssh host-list
- host-list
-
A space-separated list of the names of the hosts from which you are removing Payara Server software.
The following example removes Payara Server software on the SSH-enabled hosts sj03.example.com and sj04.example.com from the default location.
asadmin> uninstall-node-ssh sj03 sj04
Successfully connected to gfuser@sj03.example.com using keyfile /home/gfuser
/.ssh/id_rsa
Successfully connected to gfuser@sj04.example.com using keyfile /home/gfuser
/.ssh/id_rsa
Command uninstall-node-ssh executed successfully.
See Also
You can also view the full syntax and options of the subcommands by typing the following commands at the command line:
-
asadmin help uninstall-node-ssh