Difference between revisions of "Configure OpenSSH to allow Public-key authentication"
Jump to navigation
Jump to search
Line 10: | Line 10: | ||
== See also == | == See also == | ||
− | * | + | * {{sudo}} |
* [[Cisco IOS/Configure public RSA key authentication]] | * [[Cisco IOS/Configure public RSA key authentication]] | ||
* [[Digital Media Concepts/RSA (cryptosystem)]] | * [[Digital Media Concepts/RSA (cryptosystem)]] |
Revision as of 12:32, 26 December 2019
Create file touch ~/.ssh/authorized_keys
and add public key of client to provide access.
Limit connecting host and command: It is also possible also to lock access to only be able to run a specific command, or use it only from a specific host [1]. See man ssh
.
Example syntax::cat ~/.ssh/authorized_keys
from="10.22.33.45",command="/path/to/executable argument" ssh-rsa key name
See also
sudo
,visudo
,su, passwd, sudo su
,Passwordless sudo
,/etc/sudoers
,/etc/sudoers.d/
,/etc/sudoers
,sudo --help
- Cisco IOS/Configure public RSA key authentication
- Digital Media Concepts/RSA (cryptosystem)
Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy.
Original Source: https://en.wikiversity.org/wiki/OpenSSH/Configure_OpenSSH_to_allow_Public-key_authentication
Advertising: