SSH Keys/fr: Difference between revisions

Jump to navigation Jump to search
Updating to match new version of source page
(Updating to match new version of source page)
(Updating to match new version of source page)
Line 133: Line 133:


== PK Best Practices ==
== PK Best Practices ==
- DO encrypt your private key.
* DO encrypt your private key.
- DO avoid copying your private key.  In particular, it should NOT appear on our clusters.
* DO avoid copying your private key.  In particular, it should NOT appear on our clusters.
- DO use ssh-agent to make encrypted keys convenient.
* DO use ssh-agent to make encrypted keys convenient.
- DO NOT use agent-forwarding if you can avoid it.  With agent-forwarding, any intermediate system(s) become trusted.
* DO NOT use agent-forwarding if you can avoid it.  With agent-forwarding, any intermediate system(s) become trusted.
- DO apply constraints to your public key to make it less powerful (dangerous).
* DO apply constraints to your public key to make it less powerful (dangerous).


Voyez aussi [https://www.youtube.com/watch?v=mRdqM1dgf3Q&feature=youtu.be ces courtes vidéos] sur comment configurer les clés SSH.
Voyez aussi [https://www.youtube.com/watch?v=mRdqM1dgf3Q&feature=youtu.be ces courtes vidéos] sur comment configurer les clés SSH.
38,760

edits

Navigation menu