Agentless Hosts

Agentless Hosts are Linux-, Solaris-, or AIX-64-bit-based, OS-vendor-supported computers that can runClosed A Control-M process that adds your job to the Run Queue of the day, according to automatic or manual scheduling, and which enables the job to execute after it fulfills its prerequisites. and execute jobs even though Control-M/Agent is not installed. Since you do not have to install an Agent on an Agentless Host, they do not require version updates, which reduces the need to install, update, or manage them.

A Server communicates with an Agentless Host via one or more associated Linux- or AIX-based Agents over an SSH File Transfer protocol (SFTP). For more information, see Creating an SSH Key. Agentless Hosts can concurrently execute up to 100 jobs per Associated Agent. You can associate more Agents to increase the number of jobs that can concurrently execute on an Agentless Host.

  • Agent_A is associated with Agentless_Host_1, which executes up to 100 concurrent jobs at any time.

  • Agent_B is associated with the following Agentless Hosts:

    • Agentless_Host_2, which executes 20 concurrent jobs while Agentless_Host_3 executes 80 jobs.

    • Agentless_Host_3, which executes 80 concurrent jobs while Agentless_Host_2 executes 20 jobs.

  • Agent_C and Agent_D are associated with Agentless_Host_4, which executes up to 200 concurrent jobs at any time. Associated Agents Agent_C and Agent_D each run 100 jobs.

Do not configure Java on an Agentless Host machine if the Federal Information Processing Standards (FIPS) option is enabled in the java.security file. Otherwise, Agentless Host utilities cannot work.

Creating an Agentless Host

This procedure describes how to create an Agentless Host and connect it to one or more Agents via an SSH File Transfer protocol (SFTP). This enables you to run and execute jobs on a host where Control-M/Agent is not installed.

Begin

  1. From the icon, select Configuration.

    The Configuration domain opens.

  2. From the drop-down list, select Agents.

    The Agents pane appears.

  3. From the Add Agent drop-down list, select Agentless Host.

    The Add Agentless Host pane appears.

  4. In the Agentless Host Name field, type a logical name.

  5. (Optional) In the TagClosed A logical name that is used to label specific Agents in a group that has a specific authorization level. field, select a tag.

  6. In the Associated Agents field, select one or more Agents to connect to (associate with) the Agentless Host.

  7. From the Set Connection Parameters area, do the following:

    1. In the SSH Server Port field, type the port number where the Agent securely communicates with the Agentless Host.

    2. (Optional) Check the Compression checkbox to compress the encrypted communication, which increases data rates over slower networks.

  8. (Optional) Click Test.

  9. In the confirmation dialog, click Add Run as User.

  10. Define a Run as User for the Agentless Host, as described in Adding a Run as User.

Creating an SSH Key

Secure Shell (SSH) keys are authentication credentials, such as usernames and passwords, that enable Agents and Agentless Hosts to communicate over a secure network communication protocol. You can determine which SSH key the Agentless Host uses in the last stage of Creating an Agentless Host when you create a Run as User, as described in Adding a Run as User. SSH supports UNIX/Linux.

This procedure describes how to create an SSH key for one or more Agentless Hosts, which enables secure communication with an Agent.

Before You Begin

  • Ensure that the number of simultaneous connections between your Agent and Agentless Host is supported by your SSH server settings.

  • Verify that SFTP is enabled on the SSH server.

  • (Linux RedHat 9 only) Enact the security changes described in KA 000421127.

Begin

  1. From the icon, select Configuration.

    The Configuration domain opens.

  2. From the drop-down list, select Agents.

    The Agents pane appears.

  3. From the Manage drop-down list, select the SSH Keys.

    The SSH Keys Management pane appears.

  4. Click .

    The Add SSH Key pane appears.

  5. Do the following: 

    1. From the Server Name drop-down list, select a Server.

    2. In the Key Name field, type a logical key name.

    3. In the Passphrase field, type a password.

    4. In the Confirm Passphrase field, re-type the password to confirm.

    5. In the Format of Key to Generate area, select one of the following format options:

      • OpenSSH: An open-source version of the SSH protocol.

      • SSH2: The standard, supported version of the SSH protocol.

    6. In the Type of Key to Generate area, select one of the following types of SSH keys:

      • RSA

      • DSA

    7. From the Number of Bits in Generated Key drop-down list, select one of the following key-lengths, in bits:

      • 512

      • 768

      • 1,024

      • 2,048

      • 3,072

  6. Click Save.

    A message appears asking you to download a text file with the SSH key, and copy it to the Agentless Host.

  7. Click Download.

    The file downloads to your default download folder.

  8. Copy the SSH key from the download folder to the following SSH public key folder on the Agentless Host:

    • OpenSSH Server on UNIX: <jobOwnerHomeDirectory>/.ssh/authorized_keys

    • SSH Tectia Server on UNIX: <jobOwnerHomeDirectory>/.ssh2/authorization

    The SSH key is created and copied to your SSH server.

Authorizing an SSH Known Host

An SSH known host is Agentless Host that Control-M has automatically authorized and connected to via SSH in the past. Authorization fails when the name of the Agentless Host changes or an additional Agentless Host with the same name is added.

This procedure describes how to reauthorize an SSH known host.

Begin

  1. From the icon, select Configuration.

    The Configuration domain opens.

  2. From the drop-down list, select Agents.

    The Agents pane appears.

  3. From the main details pane, select the Agentless Host to reauthorize.

  4. From the drop-down list, select Authorize SSH Known Host.

    The Authorize SSH Known Host window appears.

  5. Do one of the following:

    • Host: Select the Host checkbox if the name listed matches the Agentless Host name, and click Authorize.

    • Logical Host: Select the Logical Host checkbox, type the name of the Agentless Host to reauthorize, and click Authorize.

  6. Follow the prompt.

    Control-M reauthorizes the SSH known host.