cc_staff
176
edits
No edit summary |
(bit of harangue about treating private keys) |
||
Line 15: | Line 15: | ||
== SSH keys best practices == <!--T:4--> | == SSH keys best practices == <!--T:4--> | ||
SSH keys can be a good way to authenticate to your account without typing your password every time. However, to be secure, it is '''imperative that SSH keys use a strong passphrase''' that is treated like a password. | SSH keys can be a good way to authenticate to your account without typing your password every time. However, to be secure, it is '''imperative that SSH keys use a strong passphrase''' that is treated like a password. | ||
Treat the private key as a security token, even when encrypted with a passphrase. Avoid putting a private key on any shared machine. Placing an unencrypted private key on the clusters is a huge security hole. | |||
<!--T:5--> | <!--T:5--> |