Difference between revisions of "Configure OpenSSH to allow Public-key authentication"
Jump to navigation
Jump to search
(Created page with "Create file <code>touch ~/.ssh/authorized_keys</code> and add public key of client to provide access. Limit connecting host and command: It is also possible also to lock...") |
|||
(2 intermediate revisions by the same user not shown) | |||
Line 10: | Line 10: | ||
== See also == | == See also == | ||
− | * | + | * {{sudo}} |
* [[Cisco IOS/Configure public RSA key authentication]] | * [[Cisco IOS/Configure public RSA key authentication]] | ||
− | * | + | * {{sshd_config}} |
[[Category:Networking]] | [[Category:Networking]] | ||
− | |||
− | |||
[[Category:Cryptography]] | [[Category:Cryptography]] | ||
{{CC license}} | {{CC license}} | ||
Original Source: https://en.wikiversity.org/wiki/OpenSSH/Configure_OpenSSH_to_allow_Public-key_authentication | Original Source: https://en.wikiversity.org/wiki/OpenSSH/Configure_OpenSSH_to_allow_Public-key_authentication |
Latest revision as of 15:38, 23 August 2023
Create file touch ~/.ssh/authorized_keys
and add public key of client to provide access.
Limit connecting host and command: It is also possible also to lock access to only be able to run a specific command, or use it only from a specific host [1]. See man ssh
.
Example syntax::cat ~/.ssh/authorized_keys
from="10.22.33.45",command="/path/to/executable argument" ssh-rsa key name
See also[edit]
sudo
,visudo
,su, passwd, sudo su
,Passwordless sudo
,/etc/sudoers
,/etc/sudoers.d/
,/etc/sudoers
,sudo --help
- Cisco IOS/Configure public RSA key authentication
/etc/ssh/sshd_config
:AuthenticationMethods, PasswordAuthentication
,PermitRootLogin
,MaxStartups, sshd_config
Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy.
Original Source: https://en.wikiversity.org/wiki/OpenSSH/Configure_OpenSSH_to_allow_Public-key_authentication
Advertising: