

- #Ibm i access client solutions windows 10 upgrade#
- #Ibm i access client solutions windows 10 windows 10#
- #Ibm i access client solutions windows 10 password#
Remember that file /home/ROB/.ssh/GDI_GDL57.pub file I created back on the IBM i? This is the public key part of the public/private key pair. Set-Service -Name sshd -StartupType 'Automatic' New-NetFirewallRule -Name sshd -DisplayName 'OpenSSH Server (sshd)' -Enabled True -Direction Inbound -Protocol TCP -Action Allow -LocalPort 22 Make sure the firewall rule OpenSSH-Server-In-TCP is there and Enabled = True. Get-WindowsCapability-Online | ? Name -like 'OpenSSH*' 1.0Īdd-WindowsCapability -Online -Name OpenSSH.Server~~~~ 0.0. PS C:\WINDOWS\system32> Get-WindowsCapability -Online | ? Name -like 'OpenSSH*'Īdd-WindowsCapability -Online -Name OpenSSH.Client~~~~ 0.0. I right click on that and select "Run as administrator." It lists PowerShell near the top of the list. So I simply type in powershell there, but don't press enter. I love the search bar at the bottom of Windows 10. Since you're going to end up using PowerShell for many things in this process anyway, I’ll just use that for all of it and bypass the GUI. I’m going to be following the instructions from this website.
#Ibm i access client solutions windows 10 windows 10#
Setup on Windows 10 or Windows Server 2019

The default on CRTUSRPRF is *USRPRF which will make it /home/USRPRF where USRPRF is the name of the user profile. If you have to run the CHGUSRPRF then you should sign off and back on again.

If your home directory is not named like /home/ROB then I suggest you change it to this (again, replacing ROB to match your user profile).ĬHGUSRPRF USRPRF(ROB) HOMEDIR('/home/ROB') Your public key has been saved in /home/ROB/.ssh/GDI_GDL57.pub. Your identification has been saved in /home/ROB/.ssh/GDI_GDL57. Changing these names like I did will confuse some people.Įnter file in which to save the key (/home/ROB/.ssh/id_rsa): ssh subdirectory but the files will be id_rsa and id_rsa.pub. If you leave it blank and just press enter it will also create the. I figured this may make things easier when I start setting up multiple keys and I had the source/target systems in the name. I ended up giving mine a different name than the default of id_rsa. Use the commands below to create either a DSA or RSA key pair:
#Ibm i access client solutions windows 10 password#
This just makes more sense than either using a user whose password never changes or having to change scripts to match new passwords.Ĭreate a DSA or RSA key pair that has no passphrase associated with it. One of my goals was to do this using a private/public key pair and not to use passwords. In this case, my Windows 10 client was the ssh server or target my IBM i was the ssh client. To test this I decided to make my Windows 10 client my first target. Instead of using RUNRMTCMD we would use ssh to execute commands on the Windows boxes. We ended up doing a kludge of workarounds-one was using RUNRMTCMD to a Windows client, which then talked to a Windows server.Īs time went on, we decided to drink the ssh Kool Aid and get all of our Windows based clients and servers on supported versions of Windows and replace Client Access for Windows with iACS. That daemon was deemed a security risk here and not allowed to access any Windows server. There were many issues with RUNRMTCMD, not the least being your password was sent in the clear. One of the features missing from iACS is the remote command daemon so that you could run RUNRMTCMD from your IBM i and have it execute a command on your PC. More details about iACS can be found here. A simple solution is to migrate to IBM i Access Client Solutions, often called iACS.
#Ibm i access client solutions windows 10 upgrade#
As many people start to upgrade their PCs to Windows 10, or their PC based servers to Windows 2019, they are finding out that the deprecated IBM Client Access for Windows is no longer supported on those newer operating systems.
