how can i login without password through ssh
Answer Posted / chetan
First log in on A as user a and generate a pair of authentication keys. Do not enter a passphrase:
a@A:~> ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/home/a/.ssh/id_rsa):
Created directory '/home/a/.ssh'.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/a/.ssh/id_rsa.
Your public key has been saved in /home/a/.ssh/id_rsa.pub.
The key fingerprint is:
3e:4f:05:79:3a:9f:96:7c:3b:ad:e9:58:37:bc:37:e4 a@A
Now use ssh to create a directory ~/.ssh as user b on B. (The directory may already exist, which is fine):
a@A:~> ssh b@B mkdir -p .ssh
b@B's password:
Finally append a's new public key to b@B:.ssh/authorized_keys and enter b's password one last time:
a@A:~> cat .ssh/id_rsa.pub | ssh b@B 'cat >> .ssh/authorized_keys'
b@B's password:
From now on you can log into B as b from A as a without password:
a@A:~> ssh b@B hostname
B
A note from one of our readers: Depending on your version of SSH you might also have to do the following changes:
Put the public key in .ssh/authorized_keys2
Change the permissions of .ssh to 700
Change the permissions of .ssh/authorized_keys2 to 640
Is This Answer Correct ? | 0 Yes | 1 No |
Post New Answer View All Answers
what command to restore if the boot block is corrupted in linux
What are the drawbacks of implementing a ring topology?
What is mac addresses?
What are your key strengths as a System/network Administrator?
What is the last major networking problem you troubleshot and solved on your own in the last year?
Define the proper termination rate for utp cables?
hi all of you i m looking part time online job (data entry)without investment , please help me
How do you manage multiple concurrent high level projects?
Suppose if a network which contains two servers and twenty workstations, where is the best place to install an anti-virus program?
How would you monitor and maintain the local area network, email, internet & intranet systems to ensure data security and prevent occurrence of faults?
How network topology affect your decision in setting up a network?
How frequent the STP information will be exchanged
What is nat?
Define 10base-t?
How proxy servers protect computer networks?