![]() #THE CONNECTION IS NOT SECURE. LOGINS ENTERED HERE HOW TO#Now you know how to set up SSH authentication using a key without any user password for remote server login. On Fedora or CentOS servers, use this command: You can restart it with this command on Debian and Ubuntu servers: When you are finished, save this file and reboot the Secure Shell service. You need to enter the Secure Shell config file /etc/ssh/sshd_config, and try to find these directives, changing them exactly like this: Using SSH keys, log in to the remote server. Actually, prior to this step, you need to ensure you have server access without a password and that your user has sudo privileges. Don’t confuse this with your server’s login password. Remove the SSH Authenticationįor added security, you could remove SSH authentication via password. You should get an instant login if you did everything right. $ cat ~/.ssh/id_rsa.pub | ssh _ip_address “mkdir -p ~/.ssh & chmod 700 ~/.ssh & cat > ~/.ssh/authorized_keys & chmod 600 ~/.ssh/authorized_keys” Logging In Without a Passwordįinally, you are ready to log in to your server, and you won’t need a key or password for it. Just in case you can’t use the ssh-copy-id utility on your PC, use this command to copy the public key: When you get authentication, the remote user file (authorized_keys) will get the public key appended. You will then get a message telling you to type in the remote_username password: ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |