rsnt_translations
56,430
edits
(Updating to match new version of source page) |
No edit summary |
||
Line 134: | Line 134: | ||
* DO apply constraints to your public key to make it less powerful (dangerous). | * DO apply constraints to your public key to make it less powerful (dangerous). | ||
Voyez aussi [https://www.youtube.com/watch?v=mRdqM1dgf3Q&feature=youtu.be ces courtes vidéos] sur comment configurer les clés SSH | Voyez aussi [https://www.youtube.com/watch?v=mRdqM1dgf3Q&feature=youtu.be ces courtes vidéos] sur comment configurer les clés SSH : | ||
* [https://www.youtube.com/watch?v=mRdqM1dgf3Q&feature=youtu.be Faster and more secure SSH] | * [https://www.youtube.com/watch?v=mRdqM1dgf3Q&feature=youtu.be Faster and more secure SSH] | ||
* [https://www.youtube.com/watch?v=q9YA5H53IHQ Using SSH Keys on Windows] | * [https://www.youtube.com/watch?v=q9YA5H53IHQ Using SSH Keys on Windows] |