Connection to the equipment through the graphical interface is performed via SSH. Authorization can occur either by password or by using a key — the latter method is more secure.
In this section, we will cover the key-based authorization process.
The configuration file is located at /etc/ssh/sshd_config
.
We recommend checking the PubkeyAuthentication
property — if it is missing, commented out, or set to no
, change the property value to yes
.
/etc/ssh/sshd_config
file, the sshd service must be restarted with the command
sudo systemctl restart sshd
/root/
folder/home/<username>/
folder/.ssh/
authorized_keys
file
After completing these steps, check the connection by clicking on the Hardware State button in the Administrator → Equipment section.
If all properties are in the “Ok” state, the connection was successful.