Using keys: Difference between revisions

New page: There are a lot of things you can do with computers to create security, that's why '''Security is a process, not a product'''. One such thing is to use SSH Keys to authenticate with a rem...
 
No edit summary
Line 15: Line 15:
# Open a [[Text Editor]] and edit ~/.ssh/authorized_keys
# Open a [[Text Editor]] and edit ~/.ssh/authorized_keys
## Paste the public key from step 4 above into this file, on one line only.
## Paste the public key from step 4 above into this file, on one line only.
# Try logging in from the first server to the second without using a password.
# Try logging in from the first server to the second without using a password.


== Troubleshooting ==
== Troubleshooting ==