Here i will try to demonstrate how to use ssh keys to login to machines without password.
Since i did not got it to work with putty now. i will do it with two unix machines and will soon continue this post on to configure it with putty.
1. Check the ssh-server installed on your machine or not. if not download the packages openssh-clients and openssh-server from the respective downloads site.
2. create public and private keys using ssh-keygen
user@home$ ssh-keygen -t dsa ##this will create public and privatye keys.
3. scp the public key to the remote host on which you want to gain the access without password.
user@home$ scp .ssh/id_dsa.pub user@machineB:~/.ssh/authorized_keys ## from machine a to machine b.
4. Now login from Machine A to Machine B and check. it will work without password.
Points:
1. you must login from the account where you have kept the private key. since, you try to login from a diferent account you private key wo0n't be there and that time you will be thrown to a password prompt.
2. Check the permissions of the directory .ssh to be 700 and the permission of the authorized_keys files must be 600. or else it won't work.
Popular Posts
-
Linux admin interview questions How do you take a single line of input from the user in a shell script? Write a script to convert all DO...
-
Network-Attached Storage 1. Introduction 2. What is a NAS Device? 3. What is a Filer? 4. Network-Attached Storage Versus Sto...
-
First thing to know is that this stuff is in the kernel and there is a good doc in your kernel source tree under Documentation/networking/bo...
-
All the commands are fired from (% - user) prompt not (# - root) so do not confuse with the #es there with root prompt. They are the command...
-
Well. We speak so much of security and make secure system, in concerns of that here I am explaining how to put ACL's on AIX...
-
Search Files on their file permissions. World readable Normal users should not have access to configuration files or passwords. An attack...
-
The Basics. Network Storage - The Basics Are you new to network storage? If so then this series of articles is for you! Over the next few...
-
Sometimes, unprivileged users must be able to accomplish tasks that require privileges. An example is the passwd program, which allows you...
-
alias Create an alias, aliases allow a string to be substituted for a word when it is used as the first word of a simple command. SYNTAX ...
-
IBM HS20 blade server. Two bays for SCSI hard drives can be noticed in the upper left area of the image. Blade servers are self-contained co...
Post a Comment