SSH Keys: Difference between revisions

no edit summary
mNo edit summary
No edit summary
Line 11: Line 11:


<!--T:12-->
<!--T:12-->
PK is based on a <i>keypair,</i> which consists of a private part, to be kept secret, and a public part, which can be distributed freely.  
PK is based on a <i>key pair,</i> which consists of a private part, to be kept secret, and a public part, which can be distributed freely.  
Anyone can use the public key to encode a message, but the message can only be decoded with the private part.  This is why PK is sometimes described as <i>asymmetric encryption.</i>
Anyone can use the public key to encode a message, but the message can only be decoded with the private part.  This is why PK is sometimes described as <i>asymmetric encryption.</i>


Line 45: Line 45:
The specific process to generate an SSH key pair depends on the operating system you use. For the Windows PuTTY or MobaXterm clients,  
The specific process to generate an SSH key pair depends on the operating system you use. For the Windows PuTTY or MobaXterm clients,  
see [[Generating SSH keys in Windows]]. For a Unix-like environment (Linux, Mac, Windows Subsystem for Linux or Cygwin), see [[Using SSH keys in Linux]].  
see [[Generating SSH keys in Windows]]. For a Unix-like environment (Linux, Mac, Windows Subsystem for Linux or Cygwin), see [[Using SSH keys in Linux]].  
In addition if you are using the cloud, OpenStack provides a method for creating keypairs: See the [[Cloud_Quick_Start#SSH_key_pair|SSH key pair]] section on the Cloud Quick Start page.
In addition if you are using the cloud, OpenStack provides a method for creating key pairs: See the [[Cloud_Quick_Start#SSH_key_pair|SSH key pair]] section on the Cloud Quick Start page.


== Installing your key == <!--T:17-->
== Installing your key == <!--T:17-->
rsnt_translations
56,430

edits