Translations:SSH Keys/2/en: Difference between revisions

From Alliance Doc
Jump to navigation Jump to search
(Importing a new version from external source)
(Importing a new version from external source)
Line 1: Line 1:
To use keys for authentication, we:
To use keys for authentication, we:
*Generate a key pair (Private and Public)
*Generate a key pair (Private and Public)
*Copy the public key to remote systems we wish to be able to log into, and mark it as an authorized key for that system
*Copy the public key to remote systems we wish to be able to log into and add it to the desired users <code>authorized_keys</code> file (see [[Using_SSH_keys_in_Linux|using ssh keys in linux]])
*Ensure permissions are set properly
*Ensure permissions are set properly, as described in [[Using_SSH_keys_in_Linux|using ssh keys in linux]]
*Test.
*Test.

Revision as of 18:36, 24 November 2017

Information about message (contribute)
This message has no documentation. If you know where or how this message is used, you can help other translators by adding documentation to this message.
Message definition (SSH Keys)
== Generating an SSH Key ==
Using PK requires some initial configuration, but once this is done it is both more secure and more convenient.
To use PK, you must generate a key pair and install the public key on the systems you intend to connect with.

To use keys for authentication, we:

  • Generate a key pair (Private and Public)
  • Copy the public key to remote systems we wish to be able to log into and add it to the desired users authorized_keys file (see using ssh keys in linux)
  • Ensure permissions are set properly, as described in using ssh keys in linux
  • Test.