In a cloud environment, performing the SSH and SCP operations from the Manager fails when using the cloud public key.
The Manager shell fails to load the key for SSH and SCP operations because the key isn’t FIPS compatible. You see the following error:
Manager@mlos.localdomain> scpToRemote -i /tmp/AWS123.pem abc.log centos 10.1.1.9 /home/centos
FIPS mode initialized
The authenticity of host '10.1.1.9 (10.1.1.9)' can't be established.
ECDSA key fingerprint is SHA256:+ANvsES8xxxQtaCPZq/s123JSdXihjuDFuAPyTBxor98hbf.
ECDSA key fingerprint is SHA1:RHNP6HOJFDaYMaEocIuytvfbal.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '10.1.1.9' (ECDSA) to the list of known hosts.
Enter passphrase for key '/tmp/ AWS123.pem':
Enter passphrase for key '/tmp/ AWS123.pem':
Enter passphrase for key '/tmp/ AWS123.pem':
Permission denied (publickey,gssapi-keyex,gssapi-with-mic).
lost connection
Please check the syntax.
Syntax -> scpToRemote -i <path/to/key> <filename> <username> <IP> <Destination location/Path>