|
FYI, I do this using expect (installed via yum). It basically allowskey.
you to script an interactive session.
For ref:
https://core.tcl-lang.org/expect/index
HTH
date: Thu, 22 Dec 2022 18:45:48 -0500
from: smith5646midrange@xxxxxxxxx
subject: SFTP using password
I am working on a program that will do SFTP using a password and not a
exec(/QOpenSys/QIBM/ProdData/SC1/OpenSSH/libexec/ssh-askpass):I have built it based on this website -
https://www.ibm.com/support/pages/batch-sftp-download-example-using-p
assword
-authentication
<https://www.ibm.com/support/pages/batch-sftp-download-example-using-
password-authentication>
When I run it, I am getting the following error
ssh_askpass:
No such file or directory
When I look in that directory, ssh-askpass does not exist there.
Does this program (or whatever it is) exist in anyone else's machine?
Does my machine have a problem?
Also, for what it is worth, I opened a ticket with IBM to ask out if
the website is either obsolete or wrong or if there is a problem with
that directory on my machine and this was the response.
I see you are using password scripts with SFTP.
This Techdoc is provided on an unsupported AS-IS basis. It does work.
Your software maintenance contract does not cover this type of
support. If you need assistance with password scripting, a consulting
contract would need to be pursued.
The really irritating part is that I am writing this to pull PTFs
from IBM's website and password is the only SFTP option from them.
I'm not a happy camper with IBM software support right now.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.