Using keys: Difference between revisions
New page: There are a lot of things you can do with computers to create security, that's why '''Security is a process, not a product'''. One such thing is to use SSH Keys to authenticate with a rem... |
No edit summary |
||
| Line 15: | Line 15: | ||
# Open a [[Text Editor]] and edit ~/.ssh/authorized_keys | # Open a [[Text Editor]] and edit ~/.ssh/authorized_keys | ||
## Paste the public key from step 4 above into this file, on one line only. | ## Paste the public key from step 4 above into this file, on one line only. | ||
# Try logging in from the first server to the second without using a password. | # Try logging in from the first server to the second without using a password. | ||
== Troubleshooting == | == Troubleshooting == | ||