Configure OpenSSH to allow Public-key authentication
Jump to navigation
Jump to search
Create file touch ~/.ssh/authorized_keys
and add public key of client to provide access.
Limit connecting host and command: It is also possible also to lock access to only be able to run a specific command, or use it only from a specific host [1]. See man ssh
.
Example syntax::cat ~/.ssh/authorized_keys
from="10.22.33.45",command="/path/to/executable argument" ssh-rsa key name
See also
sudo
,visudo
,su, passwd, sudo su
,Passwordless sudo
,/etc/sudoers
,/etc/sudoers.d/
,/etc/sudoers
,sudo --help
- Cisco IOS/Configure public RSA key authentication
/etc/ssh/sshd_config
:AuthenticationMethods, PasswordAuthentication
,PermitRootLogin
,MaxStartups, sshd_config
Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy.
Original Source: https://en.wikiversity.org/wiki/OpenSSH/Configure_OpenSSH_to_allow_Public-key_authentication
Advertising: