how can i login without password through ssh
Answer Posted / chetan
First log in on A as user a and generate a pair of authentication keys. Do not enter a passphrase:
a@A:~> ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/home/a/.ssh/id_rsa):
Created directory '/home/a/.ssh'.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/a/.ssh/id_rsa.
Your public key has been saved in /home/a/.ssh/id_rsa.pub.
The key fingerprint is:
3e:4f:05:79:3a:9f:96:7c:3b:ad:e9:58:37:bc:37:e4 a@A
Now use ssh to create a directory ~/.ssh as user b on B. (The directory may already exist, which is fine):
a@A:~> ssh b@B mkdir -p .ssh
b@B's password:
Finally append a's new public key to b@B:.ssh/authorized_keys and enter b's password one last time:
a@A:~> cat .ssh/id_rsa.pub | ssh b@B 'cat >> .ssh/authorized_keys'
b@B's password:
From now on you can log into B as b from A as a without password:
a@A:~> ssh b@B hostname
B
A note from one of our readers: Depending on your version of SSH you might also have to do the following changes:
Put the public key in .ssh/authorized_keys2
Change the permissions of .ssh to 700
Change the permissions of .ssh/authorized_keys2 to 640
| Is This Answer Correct ? | 0 Yes | 1 No |
Post New Answer View All Answers
Do you know what protocols fall under the tcp/ip internet layer?
Please list the types of Firewalls, Routers, Switches, Servers, you manage?
how to add additional instances sar r3, what are the steps to take server is down.
Define firewalls?
Tell me what protocols fall under the application layer of the tcp/ip stack?
Explain the function of the osi session layer?
VLAN tagging/un-tagging process –where and when it happens?
List the functions of a network administrator?
Tell me what happens when you use cables longer than the prescribed length?
Explain how are ip addresses arranged and displayed?
What is the last major networking problem you troubleshot and solved on your own in the last year?
how i can Design a client–server network with two servers operating at 100Base- T Fast Ethernet speed and the clients operating at regular 10Base-T Ethernet speed using a 10/100 Mbps NIC. The hub is located in a wiring closet, but the servers and clients are not. Assume that a satisfactory performance is achieved at 40% utilization of the LAN.
What is firewalls?
What is network architecture?
how to check veritas install or not