Translations:SSH Keys/2/en: Difference between revisions
Jump to navigation
Jump to search
(Importing a new version from external source) |
(Importing a new version from external source) |
||
Line 1: | Line 1: | ||
To use keys for authentication, we: | To use keys for authentication, we: | ||
*Generate a key pair (Private and Public) | *Generate a key pair (Private and Public) | ||
*Copy the public key to remote systems we wish to be able to log into | *Copy the public key to remote systems we wish to be able to log into and add it to the desired users <code>authorized_keys</code> file (see [[Using_SSH_keys_in_Linux|using ssh keys in linux]]) | ||
*Ensure permissions are set properly | *Ensure permissions are set properly, as described in [[Using_SSH_keys_in_Linux|using ssh keys in linux]] | ||
*Test. | *Test. |
Revision as of 18:36, 24 November 2017
To use keys for authentication, we:
- Generate a key pair (Private and Public)
- Copy the public key to remote systems we wish to be able to log into and add it to the desired users
authorized_keys
file (see using ssh keys in linux) - Ensure permissions are set properly, as described in using ssh keys in linux
- Test.