Try this; login to a box that you want to be able to accept SSH connections, and to the account of the username to be receiving those connections (e.g. your emsuser on the SSH server):
cd /home/emsuser/.ssh
ssh-keygen -t rsa -f /home/emsuser/.ssh/id_rsa
don't use a key password
take the generated /home/emsuser/.ssh/id_rsa.pub and add it to a new line at the end of your /home/emsuser/.ssh/authorized_keys file just as you have done with the DSA type key, only this one will have the key in a slightly different format. Just preserve the key format intact as generated in the command above and prepend any desired
command="/bin/date"
followed by a space then the test of the RSA key.
All on a single new second (or new last) line with out permitting line-wrapping in the /home/emsuser/.ssh/authorized_keys file.
Change the permissions of /home/emsuser to 700 owned by emsuser and their group.
Change the permissions of /home/emsuser/.ssh to 700 owned by emsuser and their group.
Change the permissions of /home/emsuser/.ssh/authorized_keys to 600 owned by emsuser and their group.
Change the permissions of /home/emsuser/.ssh/id_rsa to 600 owned by emsuser and their group.
Change the permissions of /home/emsuser/.ssh/id_rsa.pub to 600 owned by emsuser and their group.
then once you've added the RSA format public key from /home/emsuser/id_rsa.pub to emsuser's authorized_keys file on the local machine(s) and set the permissions:
ssh -2 -i /home/emsuser/.ssh/id_rsa -l emsuser 127.0.0.1
...where you're already logged in as emsuser on the box that will be both initiating and receiving the test SSH connection.
Please post the output of this command from the system that will be initiating ssh, where I presume emsuser is the username of the user logged in to initiate the ssh test:
man ssh
ls -ld ~emsuser
ls -ld ~emsuser/.ssh
Please post the output of this command from the system that will be receiving the ssh connections from remote ssh clients, where I presume emsuser is the username of the user to be logged in to over ssh:
ls -ld ~emsuser
ls -ld ~emsuser/.ssh
It is possible (though seemingly unlikely) that your ssh client (or server??) doesn't support DSA format keys, but does support RSA format keys.
I suspect that possibility because of your continued problems getting it to work with the DSA keys, and because of this line in the previous post you made from SSH's output:
-i file Identity for RSA authentication(default: ~/.ssh/identity).
...where it doesn't mention DSA, though perhaps (I'd hope/expect anyway) that is just an error in the command's usage synopsis.
According to this Solaris 9 does seem to support RSA and DSA, though:
http://docs.sun.com/app/docs/d.../6jd6cjru1?l=en&a=view