Skip to main content

SSH Protocol Configuration

The SSH protocol allows for remote inventory and operations on your machines.
It is also used to retrieve installed applications from a remote server.

⚠️ See Appendix 3 for instructions on configuring SSH on your network machines.


✅ Usage

watchman-agent configure protocols ssh [OPTIONS]

⚙️ Options

--client-ip	Specific IP address override (optional)
--enabled / --disabled Enable or disable the protocol (default: enabled)
--username Username for SSH connection
--password SSH password
--key-path Path to the SSH key for key-based authentication
--passphrase Passphrase if the SSH key is protected
--port Port to use for SSH connection