38,789
edits
(Updating to match new version of source page) |
(Updating to match new version of source page) |
||
Line 133: | Line 133: | ||
== PK Best Practices == | == PK Best Practices == | ||
* DO encrypt your private key. | |||
* DO avoid copying your private key. In particular, it should NOT appear on our clusters. | |||
* DO use ssh-agent to make encrypted keys convenient. | |||
* DO NOT use agent-forwarding if you can avoid it. With agent-forwarding, any intermediate system(s) become trusted. | |||
* DO apply constraints to your public key to make it less powerful (dangerous). | |||
Voyez aussi [https://www.youtube.com/watch?v=mRdqM1dgf3Q&feature=youtu.be ces courtes vidéos] sur comment configurer les clés SSH. | Voyez aussi [https://www.youtube.com/watch?v=mRdqM1dgf3Q&feature=youtu.be ces courtes vidéos] sur comment configurer les clés SSH. |