SSH Keys: Difference between revisions

Jump to navigation Jump to search
no edit summary
No edit summary
No edit summary
Line 34: Line 34:


<!--T:14-->
<!--T:14-->
You should ideally generate a key pair on your own system - a system that you believe to be secure.   
You should ideally generate a key pair on your own system --a system you believe to be secure.   
The reason for this is that the private part is security-sensitive, so you should always minimize its exposure.   
The reason for this is that the private part of the key pair should never be shared or copied on another computer, as is the case with any password.   


<!--T:15-->
<!--T:15-->
When generating a key, you will be prompted you for a "passphrase".  This is a string that is used to encrypt the private key.
When generating a key pair, you will be prompted you for a "passphrase".  This is a string that is used to encrypt the private key.
You should '''provide a strong passphrase''' that is memorable, and is not a password.  This passphrase offers protection
You should '''provide a strong passphrase''' that is memorable, and is not a password.  This passphrase offers protection
if the private key file is stolen.
if the private key file is stolen.
rsnt_translations
56,430

edits

Navigation menu