SSH Keys: Difference between revisions

Jump to navigation Jump to search
No change in size ,  3 years ago
no edit summary
(Marked this version for translation)
No edit summary
Line 145: Line 145:


== PK Best Practices == <!--T:30-->
== PK Best Practices == <!--T:30-->
- DO encrypt your private key.
* DO encrypt your private key.
- DO avoid copying your private key.  In particular, it should NOT appear on our clusters.
* DO avoid copying your private key.  In particular, it should NOT appear on our clusters.
- DO use ssh-agent to make encrypted keys convenient.
* DO use ssh-agent to make encrypted keys convenient.
- DO NOT use agent-forwarding if you can avoid it.  With agent-forwarding, any intermediate system(s) become trusted.
* DO NOT use agent-forwarding if you can avoid it.  With agent-forwarding, any intermediate system(s) become trusted.
- DO apply constraints to your public key to make it less powerful (dangerous).
* DO apply constraints to your public key to make it less powerful (dangerous).


<!--T:6-->
<!--T:6-->
Bureaucrats, cc_docs_admin, cc_staff, rsnt_translations
2,837

edits

Navigation menu