Translations:SSH Keys/2/en: Difference between revisions
Jump to navigation
Jump to search
(Importing a new version from external source) |
(Importing a new version from external source) |
||
Line 1: | Line 1: | ||
To use keys for authentication, we: | To use keys for authentication, we: | ||
*Generate a key pair ( | *Generate a key pair (private and public) | ||
*Copy the public key to remote systems we wish to be able to log into and add it to the desired | *Copy the public key to remote systems we wish to be able to log into and add it to the desired user's <code>authorized_keys</code> file (see [[Using_SSH_keys_in_Linux|using ssh keys in linux]]) | ||
*Ensure permissions are set properly, as described in [[Using_SSH_keys_in_Linux|using ssh keys in linux]] | *Ensure permissions are set properly, as described in [[Using_SSH_keys_in_Linux|using ssh keys in linux]] | ||
*Test. | *Test. |
Revision as of 19:34, 17 April 2020
To use keys for authentication, we:
- Generate a key pair (private and public)
- Copy the public key to remote systems we wish to be able to log into and add it to the desired user's
authorized_keys
file (see using ssh keys in linux) - Ensure permissions are set properly, as described in using ssh keys in linux
- Test.