SSH Protocol Configuration
The SSH protocol allows for remote inventory and operations on your machines.
It is also used to retrieve installed applications from a remote server.
⚠️ See Appendix 3 for instructions on configuring SSH on your network machines.
✅ Usage
watchman-agent configure protocols ssh [OPTIONS]
⚙️ Options
--client-ip Specific IP address override (optional)
--enabled / --disabled Enable or disable the protocol (default: enabled)
--username Username for SSH connection
--password SSH password
--key-path Path to the SSH key for key-based authentication
--passphrase Passphrase if the SSH key is protected
--port Port to use for SSH connection