SSH Keys: Difference between revisions

no edit summary
No edit summary
No edit summary
Line 31: Line 31:
== Generating an SSH Key == <!--T:2-->
== Generating an SSH Key == <!--T:2-->
Using PK requires some initial configuration, but once this is done it is both more secure and more convenient.
Using PK requires some initial configuration, but once this is done it is both more secure and more convenient.
To use PK, you must generate a key pair and install the public key on systems you intend to connect with.
To use PK, you must generate a key pair and install the public key on the systems you intend to connect with.


<!--T:14-->
<!--T:14-->
rsnt_translations
56,430

edits