how can i login without password through ssh
Answer Posted / chetan
First log in on A as user a and generate a pair of authentication keys. Do not enter a passphrase:
a@A:~> ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/home/a/.ssh/id_rsa):
Created directory '/home/a/.ssh'.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/a/.ssh/id_rsa.
Your public key has been saved in /home/a/.ssh/id_rsa.pub.
The key fingerprint is:
3e:4f:05:79:3a:9f:96:7c:3b:ad:e9:58:37:bc:37:e4 a@A
Now use ssh to create a directory ~/.ssh as user b on B. (The directory may already exist, which is fine):
a@A:~> ssh b@B mkdir -p .ssh
b@B's password:
Finally append a's new public key to b@B:.ssh/authorized_keys and enter b's password one last time:
a@A:~> cat .ssh/id_rsa.pub | ssh b@B 'cat >> .ssh/authorized_keys'
b@B's password:
From now on you can log into B as b from A as a without password:
a@A:~> ssh b@B hostname
B
A note from one of our readers: Depending on your version of SSH you might also have to do the following changes:
Put the public key in .ssh/authorized_keys2
Change the permissions of .ssh to 700
Change the permissions of .ssh/authorized_keys2 to 640
Is This Answer Correct ? | 0 Yes | 1 No |
Post New Answer View All Answers
What characterizes a professional network administrator?
What are the fields of VLAN tag?
Suppose when you move the nic cards from one pc to another pc, does the mac address gets transferred as well?
senario: There are two switches connected via trunk port.One end station is connected to each switch via access port. All the ports are in same VLAN.All the ports have same speed 1Gbps.Start sending 1Gbps traffic from one end station to other. Determine percentage of traffic received by destination end station.
Describe a recent short term stressful situation and how you managed it?
How do you manage multiple concurrent high level projects?
How to identify the ip class of a given ip address?
when affected the system from virus , which paths will be it stored in system ?
Describe one advantage of mesh topology?
Who is network administrator?
Explain the network architecture?
What platforms do you currently work on at your desk?
Define proxy servers and how do they protect computer networks?
Suppose if a network which contains two servers and twenty workstations, where is the best place to install an anti-virus program?
what is paradoxing in neworking