how can i login without password through ssh

Answer Posted / chetan

First log in on A as user a and generate a pair of authentication keys. Do not enter a passphrase:

a@A:~> ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/home/a/.ssh/id_rsa):
Created directory '/home/a/.ssh'.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/a/.ssh/id_rsa.
Your public key has been saved in /home/a/.ssh/id_rsa.pub.
The key fingerprint is:
3e:4f:05:79:3a:9f:96:7c:3b:ad:e9:58:37:bc:37:e4 a@A
Now use ssh to create a directory ~/.ssh as user b on B. (The directory may already exist, which is fine):

a@A:~> ssh b@B mkdir -p .ssh
b@B's password:
Finally append a's new public key to b@B:.ssh/authorized_keys and enter b's password one last time:

a@A:~> cat .ssh/id_rsa.pub | ssh b@B 'cat >> .ssh/authorized_keys'
b@B's password:
From now on you can log into B as b from A as a without password:

a@A:~> ssh b@B hostname
B
A note from one of our readers: Depending on your version of SSH you might also have to do the following changes:

Put the public key in .ssh/authorized_keys2
Change the permissions of .ssh to 700
Change the permissions of .ssh/authorized_keys2 to 640

Is This Answer Correct ?    0 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

what is Cisco Firewall

1710


What is network management?

684


How to manage a network using a router?

674


Explain how are ip addresses arranged and displayed?

668


PLEASE SEND FAQ FOR NETWORK ADMINISTRATOR

1636






Define mac addresses?

700


Purpose of TTL. How it gets modified.

1749


What will happen if we send untagged packet to a tagged port

1780


Give one disadvantage of a peer to peer network?

712


how to set kernal parameters in solaris 10&9?

1635


Define one basic requirement for establishing vlans?

667


Define data encapsulation?

805


how i can Design a client–server network with two servers operating at 100Base- T Fast Ethernet speed and the clients operating at regular 10Base-T Ethernet speed using a 10/100 Mbps NIC. The hub is located in a wiring closet, but the servers and clients are not. Assume that a satisfactory performance is achieved at 40% utilization of the LAN.

2323


Define tracert?

702


respected sir., i need knowledge, i want to do R.H.E.C but problem is this i am science graduate and a new to software line, i want to develop my carrier in I.t sector. please guide. thanks

1747