how can i login without password through ssh

Answer Posted / chetan

First log in on A as user a and generate a pair of authentication keys. Do not enter a passphrase:

a@A:~> ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/home/a/.ssh/id_rsa):
Created directory '/home/a/.ssh'.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/a/.ssh/id_rsa.
Your public key has been saved in /home/a/.ssh/id_rsa.pub.
The key fingerprint is:
3e:4f:05:79:3a:9f:96:7c:3b:ad:e9:58:37:bc:37:e4 a@A
Now use ssh to create a directory ~/.ssh as user b on B. (The directory may already exist, which is fine):

a@A:~> ssh b@B mkdir -p .ssh
b@B's password:
Finally append a's new public key to b@B:.ssh/authorized_keys and enter b's password one last time:

a@A:~> cat .ssh/id_rsa.pub | ssh b@B 'cat >> .ssh/authorized_keys'
b@B's password:
From now on you can log into B as b from A as a without password:

a@A:~> ssh b@B hostname
B
A note from one of our readers: Depending on your version of SSH you might also have to do the following changes:

Put the public key in .ssh/authorized_keys2
Change the permissions of .ssh to 700
Change the permissions of .ssh/authorized_keys2 to 640

Is This Answer Correct ?    0 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

what command to restore if the boot block is corrupted in linux

7124


What are the drawbacks of implementing a ring topology?

757


What is mac addresses?

730


What are your key strengths as a System/network Administrator?

6263


What is the last major networking problem you troubleshot and solved on your own in the last year?

1732


Define the proper termination rate for utp cables?

728


hi all of you i m looking part time online job (data entry)without investment , please help me

1665


How do you manage multiple concurrent high level projects?

2153


Suppose if a network which contains two servers and twenty workstations, where is the best place to install an anti-virus program?

844


How would you monitor and maintain the local area network, email, internet & intranet systems to ensure data security and prevent occurrence of faults?

2013


How network topology affect your decision in setting up a network?

934


How frequent the STP information will be exchanged

2062


What is nat?

797


Define 10base-t?

751


How proxy servers protect computer networks?

756