Translations:SSH Keys/2/en: Difference between revisions
Jump to navigation
Jump to search
(Importing a new version from external source) |
(Importing a new version from external source) |
||
Line 1: | Line 1: | ||
To use keys for authentication, | To use keys for authentication, you must: | ||
*Generate a key pair (private and public) | *Generate a key pair (private and public) | ||
*Copy the public key to remote systems | *Copy the public key to remote systems you want to log into and add it to your <code>.ssh/authorized_keys</code> file (see [[Using_SSH_keys_in_Linux|using ssh keys in linux]]) | ||
*Ensure permissions are set properly, as described in [[Using_SSH_keys_in_Linux|using ssh keys in linux]] | *Ensure permissions are set properly, as described in [[Using_SSH_keys_in_Linux|using ssh keys in linux]] | ||
*Test. | *Test. |
Revision as of 16:56, 18 September 2020
To use keys for authentication, you must:
- Generate a key pair (private and public)
- Copy the public key to remote systems you want to log into and add it to your
.ssh/authorized_keys
file (see using ssh keys in linux) - Ensure permissions are set properly, as described in using ssh keys in linux
- Test.