Translations:SSH Keys/2/en

Revision as of 17:02, 25 January 2017 by FuzzyBot (talk | contribs) (Importing a new version from external source)

To use keys for authentication, we:

  • Generate a key pair (Private and Public)
  • Copy the public key to remote systems we wish to be able to log into, and mark it as an authorized key for that system
  • Ensure permissions are set properly
  • Test.