SSH Keys/fr: Difference between revisions

Updating to match new version of source page
(Updating to match new version of source page)
(Updating to match new version of source page)
Line 133: Line 133:


== PK Best Practices ==
== PK Best Practices ==
- DO encrypt your private key.
* DO encrypt your private key.
- DO avoid copying your private key.  In particular, it should NOT appear on our clusters.
* DO avoid copying your private key.  In particular, it should NOT appear on our clusters.
- DO use ssh-agent to make encrypted keys convenient.
* DO use ssh-agent to make encrypted keys convenient.
- DO NOT use agent-forwarding if you can avoid it.  With agent-forwarding, any intermediate system(s) become trusted.
* DO NOT use agent-forwarding if you can avoid it.  With agent-forwarding, any intermediate system(s) become trusted.
- DO apply constraints to your public key to make it less powerful (dangerous).
* DO apply constraints to your public key to make it less powerful (dangerous).


Voyez aussi [https://www.youtube.com/watch?v=mRdqM1dgf3Q&feature=youtu.be ces courtes vidéos] sur comment configurer les clés SSH.
Voyez aussi [https://www.youtube.com/watch?v=mRdqM1dgf3Q&feature=youtu.be ces courtes vidéos] sur comment configurer les clés SSH.
38,789

edits