Here i will try to demonstrate how to use ssh keys to login to machines without password.
Since i did not got it to work with putty now. i will do it with two unix machines and will soon continue this post on to configure it with putty.
1. Check the ssh-server installed on your machine or not. if not download the packages openssh-clients and openssh-server from the respective downloads site.
2. create public and private keys using ssh-keygen
user@home$ ssh-keygen -t dsa ##this will create public and privatye keys.
3. scp the public key to the remote host on which you want to gain the access without password.
user@home$ scp .ssh/id_dsa.pub user@machineB:~/.ssh/authorized_keys ## from machine a to machine b.
4. Now login from Machine A to Machine B and check. it will work without password.
Points:
1. you must login from the account where you have kept the private key. since, you try to login from a diferent account you private key wo0n't be there and that time you will be thrown to a password prompt.
2. Check the permissions of the directory .ssh to be 700 and the permission of the authorized_keys files must be 600. or else it won't work.
Popular Posts
-
Linux admin interview questions How do you take a single line of input from the user in a shell script? Write a script to convert all DO...
-
Network-Attached Storage 1. Introduction 2. What is a NAS Device? 3. What is a Filer? 4. Network-Attached Storage Versus Sto...
-
Tried Gusty Gibbon Ubuntu 6.10 on Compaq f733AU works fine without any major problems. some tweaking required in udev/rules/70-persistent-ne...
-
All the commands are fired from (% - user) prompt not (# - root) so do not confuse with the #es there with root prompt. They are the command...
-
UNIX Questions and Answers Most answers refer to Solaris 2.x systems Hardware Issues How can I configure new devices without rebooting? What...
-
Password Aging While it's clearly possible to use the /etc/passwd and /etc/shadow files in Solaris and other Unix systems without mak...
-
The Basics. Network Storage - The Basics Are you new to network storage? If so then this series of articles is for you! Over the next few...
-
Sometimes, unprivileged users must be able to accomplish tasks that require privileges. An example is the passwd program, which allows you...
-
Search Files on their file permissions. World readable Normal users should not have access to configuration files or passwords. An attack...
-
First thing to know is that this stuff is in the kernel and there is a good doc in your kernel source tree under Documentation/networking/bo...
Post a Comment