Difference between revisions of "Configure OpenSSH to allow Public-key authentication"
Jump to navigation
Jump to search
Line 12: | Line 12: | ||
* {{sudo}} | * {{sudo}} | ||
* [[Cisco IOS/Configure public RSA key authentication]] | * [[Cisco IOS/Configure public RSA key authentication]] | ||
− | * | + | * {{sshd_config}} |
[[Category:Networking]] | [[Category:Networking]] |
Latest revision as of 15:38, 23 August 2023
Create file touch ~/.ssh/authorized_keys
and add public key of client to provide access.
Limit connecting host and command: It is also possible also to lock access to only be able to run a specific command, or use it only from a specific host [1]. See man ssh
.
Example syntax::cat ~/.ssh/authorized_keys
from="10.22.33.45",command="/path/to/executable argument" ssh-rsa key name
See also[edit]
sudo
,visudo
,su, passwd, sudo su
,Passwordless sudo
,/etc/sudoers
,/etc/sudoers.d/
,/etc/sudoers
,sudo --help
- Cisco IOS/Configure public RSA key authentication
/etc/ssh/sshd_config
:AuthenticationMethods, PasswordAuthentication
,PermitRootLogin
,MaxStartups, sshd_config
Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy.
Original Source: https://en.wikiversity.org/wiki/OpenSSH/Configure_OpenSSH_to_allow_Public-key_authentication
Advertising: