Translations:SSH Keys/2/en: Difference between revisions
Jump to navigation
Jump to search
(Importing a new version from external source) |
(Importing a new version from external source) |
||
Line 1: | Line 1: | ||
To use keys for authentication, we: | To use keys for authentication, we: | ||
*Generate a key pair (Private and Public) | *Generate a key pair (Private and Public) | ||
*Copy the public | *Copy the public keys to remote sites we wish to be able to login to, and mark it as an authorized key for that system | ||
*Ensure permissions are set properly | *Ensure permissions are set properly | ||
*Test. | *Test. |
Revision as of 14:22, 10 November 2016
To use keys for authentication, we:
- Generate a key pair (Private and Public)
- Copy the public keys to remote sites we wish to be able to login to, and mark it as an authorized key for that system
- Ensure permissions are set properly
- Test.