Translations:SSH Keys/2/en: Difference between revisions

From Alliance Doc
Jump to navigation Jump to search
(Importing a new version from external source)
(Importing a new version from external source)
Line 1: Line 1:
To use keys for authentication, we:
To use keys for authentication, we:
*Generate a key pair (Private and Public)
*Generate a key pair (private and public)
*Copy the public key to remote systems we wish to be able to log into and add it to the desired users <code>authorized_keys</code> file (see [[Using_SSH_keys_in_Linux|using ssh keys in linux]])
*Copy the public key to remote systems we wish to be able to log into and add it to the desired user's <code>authorized_keys</code> file (see [[Using_SSH_keys_in_Linux|using ssh keys in linux]])
*Ensure permissions are set properly, as described in [[Using_SSH_keys_in_Linux|using ssh keys in linux]]
*Ensure permissions are set properly, as described in [[Using_SSH_keys_in_Linux|using ssh keys in linux]]
*Test.
*Test.

Revision as of 19:34, 17 April 2020

Information about message (contribute)
This message has no documentation. If you know where or how this message is used, you can help other translators by adding documentation to this message.
Message definition (SSH Keys)
== Generating an SSH Key ==
Using PK requires some initial configuration, but once this is done it is both more secure and more convenient.
To use PK, you must generate a key pair and install the public key on the systems you intend to connect with.

To use keys for authentication, we:

  • Generate a key pair (private and public)
  • Copy the public key to remote systems we wish to be able to log into and add it to the desired user's authorized_keys file (see using ssh keys in linux)
  • Ensure permissions are set properly, as described in using ssh keys in linux
  • Test.