SSH Keys/fr: Difference between revisions

Jump to navigation Jump to search
Created page with "Nous vous recommandons fortement d'utiliser l'authentification par CP. Il vous faudra travailler un peu plus sur la configuration, mais le résultat sera plus sécuritaire et..."
No edit summary
(Created page with "Nous vous recommandons fortement d'utiliser l'authentification par CP. Il vous faudra travailler un peu plus sur la configuration, mais le résultat sera plus sécuritaire et...")
Line 12: Line 12:
* The remote server can use your public key (found in .ssh/authorized_keys in your home folder) to verify your identity. If that fails, the remote server can ask for your password. This is really a secondary authentication mechanism, and is less desirable because your password is handled and possibly exposed.
* The remote server can use your public key (found in .ssh/authorized_keys in your home folder) to verify your identity. If that fails, the remote server can ask for your password. This is really a secondary authentication mechanism, and is less desirable because your password is handled and possibly exposed.


We strongly recommend using PK for authentication. This requires some additional configuration, but winds up being both more secure and more convenient.
Nous vous recommandons fortement d'utiliser l'authentification par CP. Il vous faudra travailler un peu plus sur la configuration, mais le résultat sera plus sécuritaire et plus pratique.


Pour l'authentification à l'aide de ces clés :
Pour l'authentification à l'aide de ces clés :
rsnt_translations
56,430

edits

Navigation menu