|
Lines 134-146
remote logins, and the user can thus use
Link Here
|
| 134 |
identities anywhere in the network in a secure way. |
134 |
identities anywhere in the network in a secure way. |
| 135 |
.Pp |
135 |
.Pp |
| 136 |
There are two main ways to get an agent set up: |
136 |
There are two main ways to get an agent set up: |
| 137 |
Either the agent starts a new subcommand into which some environment |
137 |
The first is that the agent starts a new subcommand into which some environment |
| 138 |
variables are exported, or the agent prints the needed shell commands |
138 |
variables are exported, eg |
| 139 |
(either |
139 |
.Cm ssh-agent xterm & . |
|
|
140 |
The second is that the agent prints the needed shell commands (either |
| 140 |
.Xr sh 1 |
141 |
.Xr sh 1 |
| 141 |
or |
142 |
or |
| 142 |
.Xr csh 1 |
143 |
.Xr csh 1 |
| 143 |
syntax can be generated) which can be evalled in the calling shell. |
144 |
syntax can be generated) which can be evalled in the calling shell, eg |
|
|
145 |
.Cm eval `ssh-agent -s` |
| 146 |
for Bourne-type shells such as |
| 147 |
.Xr sh 1 |
| 148 |
or |
| 149 |
.Xr ksh 1 |
| 150 |
and |
| 151 |
.Cm eval `ssh-agent -c` |
| 152 |
for |
| 153 |
.Xr csh 1 |
| 154 |
shell and derivatives. |
| 155 |
.Pp |
| 144 |
Later |
156 |
Later |
| 145 |
.Xr ssh 1 |
157 |
.Xr ssh 1 |
| 146 |
looks at these variables and uses them to establish a connection to the agent. |
158 |
looks at these variables and uses them to establish a connection to the agent. |