how can i login without password through ssh

Answer Posted / chetan

First log in on A as user a and generate a pair of authentication keys. Do not enter a passphrase:

a@A:~> ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/home/a/.ssh/id_rsa):
Created directory '/home/a/.ssh'.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/a/.ssh/id_rsa.
Your public key has been saved in /home/a/.ssh/id_rsa.pub.
The key fingerprint is:
3e:4f:05:79:3a:9f:96:7c:3b:ad:e9:58:37:bc:37:e4 a@A
Now use ssh to create a directory ~/.ssh as user b on B. (The directory may already exist, which is fine):

a@A:~> ssh b@B mkdir -p .ssh
b@B's password:
Finally append a's new public key to b@B:.ssh/authorized_keys and enter b's password one last time:

a@A:~> cat .ssh/id_rsa.pub | ssh b@B 'cat >> .ssh/authorized_keys'
b@B's password:
From now on you can log into B as b from A as a without password:

a@A:~> ssh b@B hostname
B
A note from one of our readers: Depending on your version of SSH you might also have to do the following changes:

Put the public key in .ssh/authorized_keys2
Change the permissions of .ssh to 700
Change the permissions of .ssh/authorized_keys2 to 640

Is This Answer Correct ?    0 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What characterizes a professional network administrator?

531


What are the fields of VLAN tag?

1501


Suppose when you move the nic cards from one pc to another pc, does the mac address gets transferred as well?

752


senario: There are two switches connected via trunk port.One end station is connected to each switch via access port. All the ports are in same VLAN.All the ports have same speed 1Gbps.Start sending 1Gbps traffic from one end station to other. Determine percentage of traffic received by destination end station.

2066


Describe a recent short term stressful situation and how you managed it?

1869






How do you manage multiple concurrent high level projects?

1965


How to identify the ip class of a given ip address?

604


when affected the system from virus , which paths will be it stored in system ?

1441


Describe one advantage of mesh topology?

706


Who is network administrator?

759


Explain the network architecture?

562


What platforms do you currently work on at your desk?

1534


Define proxy servers and how do they protect computer networks?

578


Suppose if a network which contains two servers and twenty workstations, where is the best place to install an anti-virus program?

585


what is paradoxing in neworking

2274