A.0 Configuring ssh() Key Authentication

The installation script uses ssh() and scp() to copy files to and execute scripts on the Conferencing hosts. In order to avoid typing the root password for the Conferencing hosts numerous times during the install, you can configure private/public key authentication for ssh(1). If private/public key authentication is in place, rather than prompting for the root password, ssh()/scp() gets an authentication token generated by using the private key. It authenticates the token on the Conferencing host by using the root user’s list of authorized public keys.

Use the following procedures to configure public/private key authentication: