Online Documentation for Data Generator for Oracle
SSH tunneling options
To setup the connection via SSH tunnel, input the following values in the corresponding fields:
- SSH host name is the name of the host where SSH server is running
- SSH port indicates the port where SSH server is activated
- SSH user name stands for the user on the machine where SSH server is running (Note: it is a Linux/Windows user, not a user of Oracle server)
- SSH password is the Linux/Windows user password
Use Private Key for authentication
If the SSH encryption is enabled on the SSH server, a user can generate a pair of cryptographic keys (the Private key and the Public key). The Public key is placed on the SSH server, and the Private key is the part you keep secret inside a secure box that can only be opened with the correct passphrase (or an empty string as the passphrase). When you wish to access the remote system, you open the secure box with your passphrase (if any), and use the private key to authenticate yourself with the Public key on the remote Linux computer.
SSH Key file
Specify the location (the secure box) of the Private key file on your local machine.
Supported Private Key file formats are:
Note that you need to trust your local machine not to scrape your passphrase or a copy of your Private key file while it is out of its secure box.