Eliminate Interactive Host Key Verification
How to configure the CGE properties file to eliminate the need to verify interactive host keys.
The SSH protocol uses the host key to authenticate the server to the client, which is of particular importance when the client will be sending confidential data (passwords, for example) to the server. Since the SSH protocol used by CGE does not permit the use of passwords, and the clients do not generally send other secrets to CGE, there is no real need for the client (and the invoking user) to verify that the host key is the one that the user trusts.
By default, the CGE CLI commands require explicit first time verification of host keys, as you have seen in the examples above. There is, however, a setting that you can set in your cge.properties file(s) that will cause the CGE CLI commands to consider any host key as trusted. This eliminates the need for a first-time interactive CLI command each time you start using a server on a new TCP/IP port number, and streamlines the process of connecting to a new instance CGE.
To add this setting, make sure that all appropriate cge.properties files contain the following line:
cge.cli.trust-keys=true
--trust-keys option to any of the CGE CLI commands.