Usage: ssh-userkeygendist2.sh [options] host [[options] [host]] ...
Options:
-u, --remote-user remote_user The default is local username.
-W, --ssh2-windows The remote host is running Windows and its ssh
client is SSH Tectia.
-S, --ssh2-unix The remote host is running Unix and its ssh
client is SSH Tectia.
-O, --openssh-unix The remote host is running Unix and its ssh
client is OpenSSH.
-Z, --ssh2-zos The remote host is running z/OS and its ssh
client is SSH Tectia.
-H, --hostlist-file hostlist_file File contains hostnames or
username/hostname pairs.
-p, --password-file File contains password used
for authentication.
-P, --empty-passphrase Assume empty passphrase when
generating key pair.
-d, --allow-keygen-overwrite Allow ssh-keygen2 to overwrite
an existing key pair.
-t, --key-type dsa|rsa Type of the generated key
-b, --key-bits bits Length of the generated key
-f, --pubkey-file public_key_file Disable key pair generation,
distribute this key instead.
-a, --accept-new-host-keys Automatically accept new hostkeys.
Use with care.
-N, --only-accept-new-host-keys Only accept the hostkeys. Do not
generate or distribute user keys.
-A, --accepted-host-key-log log_file Log file of accepted new hostkeys
-n, --do-not-execute Print the commands but do not
execute them.
-v, --verbose Use verbose mode.
|