Key Authentication Login Host

Source: Internet
Author: User


Learning Précis-writers

There are two types of keys: symmetric key and asymmetric key
two key types
According to the cryptographic keys used by the cipher algorithm and the encryption key is the same, whether the decryption process can be deduced from the encryption process (or by the decryption process to derive the encryption process), the cryptosystem can be divided into symmetric cryptography (also known as single-key cryptography, secret key cryptography, symmetric key cryptography) and asymmetric cryptosystem ( Also known as dual-key cryptosystem, public key cryptosystem, asymmetric key cryptosystem).
symmetric key Encryption, also known as private key encryption or session key encryption algorithm, that is, the sender and receiver of the information use the same key to encrypt and decrypt data. Its biggest advantage is the fast encryption/decryption speed, which is suitable for encrypting large data volumes, but key management is difficult.

  • Key Login Configuration Flow
    1. key generation open Puttygen, click Generate, Generate key
    650) this.width=650; "src=" Http://i3.tietuku.com/a7f7b7add4c91ca3.png "style=" padding:0px;margin:0px;border:0px; Vertical-align:middle; "/>

    2. Post-generated public key
    650) this.width=650; "src=" Http://i3.tietuku.com/483c27542af30973.png "style=" padding:0px;margin:0px;border:0px; Vertical-align:middle; "/>

    3. private key, write password, save to local directory
    650) this.width=650; "src=" Http://i3.tietuku.com/e14002976e1feaa0.png "style=" padding:0px;margin:0px;border:0px; Vertical-align:middle; "/>

    650) this.width=650; "src=" Http://i3.tietuku.com/f2024536600fd910.png "style=" padding:0px;margin:0px;border:0px; Vertical-align:middle; "/>
    4. save public key refers to server host
    Open the Linux terminal and/root/Created under Directory .ssh/authorized_keys File and glue the generated public key in. Save exit.
    650) this.width=650; "src=" Http://i3.tietuku.com/bf11521b477fc9b5.png "style=" padding:0px;margin:0px;border:0px; Vertical-align:middle; "/>
    5. Change file Permissions

    [Email protected] ~]# chmod 700/root/.ssh/
    [Email protected] ~]# chmod 600/root/.ssh/authorized_keys

    6. Changing firewall rules

    [[email protected] ~]# setenforce 0[[email protected] ~]# vi /etc/ Selinux/config# this file controls the state of selinux on the  system.# SELINUX= can take one of these three values:#      enforcing - SELinux security policy is enforced.#      permissive - SELinux prints warnings instead of  Enforcing.#     disabled - no selinux policy is loaded. selinux=disabled   ## #原来的enforcing改为disabled, and is permanently active after reboot. # selinuxtype= can take one of these two values:#      targeted - Targeted processes are protected,#      mls - multi level security protection. Selinuxtype=targeted~ "/etc/selinux/config"  13l, 457c[[email protected] ~]# iptables - f  # #临时清楚防火墙规则, reload [[email protected] ~]# service iptables save  after reboot  ##  firewall rules write to save iptables: Save firewall rules to  /etc/sysconfig/iptables:     [OK]

    7.  Configure Telnet client
    650) this.width=650, "src=" Http://i3.tietuku.com/0c0e5c12fb4e8338.png "style=" padding:0px;margin:0px;border:0px; Vertical-align:middle; "/>
    650 ) this.width=650; "src=" Http://i3.tietuku.com/617e2bdb1631f5ff.png "style=" padding:0px;margin:0px;border:0px; Vertical-align:middle; "/>

    650) this.width=650; "src=" Http://i3.tietuku.com/b6585af0740ba773.png "style=" padding:0px;margin:0px;border:0px; Vertical-align:middle; "/>
    After clicking on the session, click Save to save the configuration and click Open to enter the login screen.
    650) this.width=650; "src=" Http://i3.tietuku.com/21f06ce9bc110816.png "style=" padding:0px;margin:0px;border:0px; Vertical-align:middle; "/>
    Enter your user name, enter your password when you save the private key (that is, save to local to confirm the password passphrase) when you generate the key.
    650) this.width=650; "src=" Http://i3.tietuku.com/8738eac27da22932.png "style=" padding:0px;margin:0px;border:0px; Vertical-align:middle; "/>



Key Authentication Login Host

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.