Configure the SSH service to log on to the Linux server using the certificate
Common authentication methods for logging on to a Linux server through SSH (Secure Shell) include passwords and certificates. From the security perspective, we recommend that you log on with a certificate. It takes a lot of effort to configure SSH login using a certificate on the server
Tags: RDA composition profile CTO API smooth Pat set OLESSH (remote connection tool) connection principle: SSH service is a daemon (demon), the system background listening client connection, SSH server process named sshd, responsible for real-time monitoring client requests (IP 22 port), including public key exchange and other information. SSH service driven by 2
Authorized_keys fileThe remote host stores the user's public key in the $home/.ssh/authorized_keys file of the user's home directory after logging in. The public key is a string, just append it to the end of the Authorized_keys file.Instead of using the Ssh-copy-id command above, use the following command to explain the saving process for the public key:
$ SSH
Installation and use of SSH in Ubuntu environmentSSH refers to secure Shell, which is a secure transport protocol that allows Ubuntu clients to access remote servers via SSH. SSH introduction and working mechanism can be a look at the article SSH introduction and working mechanism.SSH sub-client openssh-client and Open
Editor's Guide: Any system administrator or webmaster is familiar with SSH. This great technology (51cto system channel just expressed thanks to it on Thanksgiving Day) this frees us from having to go to the server room to manage servers, or worry about content theft when remotely connecting to the server. This article will introduce 25 best SSH commands. If you haven't used them, record them.
OpenSSH is a
What is SSH?SSH (full Secure Shell) is an encrypted network protocol. Data that uses the protocol will be encrypted, and if the intermediate data leaks in transit, it can also ensure that no one can read out useful information.To use SSH, the target machine should install the SSH server application because
As a Linux administrator, logging on to multiple Linux servers for remote operations is part of the daily work. But with the increase of the server, each login, the system will prompt to enter the user name and password, frequent input user name and password is a very annoying thing. Some people may say that you can use some of the client tools, such as: SECURECRT, and so on, it is very convenient for using these software, but these software is not expensive commercial software is attached to a
1. Create a public key on the local machine
Open the Universal terminal, execute the following command, ignoring all the output, all the way to enter the cheerful.
Ssh-keygen-t rsa-c ' Your [email protected] '
-t specifies the key type, which is RSA by default and can be omitted
-C Set comment text, such as your mailbox
2. Copy the public key to the SSH server
The public key ~
Transferred from: http://7056824.blog.51cto.com/69854/403669As a Linux administrator, logging on to multiple Linux servers for remote operations is part of the daily work. But with the increase of the server, each login, the system will prompt to enter the user name and password, frequent input user name and password is a very annoying thing. Some people may say that you can use some of the client tools, such as: SECURECRT, and so on, it is very convenient for using these software, but these sof
OpenSSH
OpenSSH is a free open-source implementation of the SSH (Secure Shell) protocol. It uses secure and encrypted network connection tools instead of Telnet, FTP, rlogin, RSH, and rcp tools. OpenSSH supports SSH protocol versions 1.3, 1.5, and 2. Since OpenSSH 2.9, the default protocol is version 2, which uses the RSA key by default.
1. Why is SSH used?
Using
The 25 SSH commands that must be remembered are free versions of the SSH connection tool. Telnet, rlogin and ftp users may not realize that their passwords transmitted over the Internet are unencrypted, but SSH is encrypted. OpenSSH encrypts all communications (including passwords ), effectively eliminates eavesdropping, connection hijacking, and other attacks. I
Login: SSH [hostname]-u user
Enter the password :*****
After login, you can control it like you control your own machine, but there is no visual interface. But now I have used two versions of Linux (SUSE and fc5) that can use tools similar to the FTP interface. When using the tool to connect, select ssh. The port is the ssh port of the server. The default port is
1. Create a public key on the local machineOpen the Universal terminal, execute the following command, ignoring all the output, all the way to enter the cheerful.Ssh-keygen-t rsa-c ' Your [email protected] '-t specifies the key type, which is RSA by default and can be omitted-C Set comment text, such as your mailbox2. Copy the public key to the SSH serverThe public key ~/id_rsa.pub file generated in the previous step is copied to the ~/.
In order to SSH configuration file security, ensure that the configuration permissions are not changed, can be unified management through puppet. 1. To create an SSH module related directory: [Email protected]:ssh# pwd/etc/puppet/modules/ssh[email protected]:ssh# lltotal 12d
A system administrator may manage multiple servers at the same time, which may be placed in different places. It is obviously not the best way to manage them by accessing them one by one. Remote control should be the most effective method. The most common application for remote access is SSH (what? Are you still using telnet ?.... $ % @ % W @ $ ##).
Configure SSH password-less logon in CentOS
Implement
Http://bbs.chinaunix.net/archiver/tid-343905-page-1.html
Sometimes we use SCP when copying/moving files to another machine, because it is safer. However, if
It is annoying to enter passwords, especially in scripts. However, SSH has another key pair for verification.
. The following describes how to generate a key pair for your reference.
Step 1: generate a key pair. I use the RSA key. Run the command "ssh
SSH-Server Configuration Guide
I. Introduction to SSH
SSH (Secure Shell) is a Secure communication protocol provided by an application. It can securely access the server through the SSH protocol, because SSH has a mature public key encryption system, data is encrypted during
PS: The use of SSH, to manage a large number of servers can bring great convenience. When we access another server from one server, we can enter password access without compromising efficiency. But when we need to access multiple servers, or hundreds of dozens of, it's a bit of a hassle. Or do some batch upgrades on hundreds of dozens of of servers, modify the configuration, and so on, if you need to check the password-by-step or log-in operation will
In the data center, some companies prefer to use some more professional SSH server/client software to replace the system's own OpenSSH software to ensure the security of system management, file transfer and application connections, effectively resisting various internal and external security risks. In response to this environmental requirement, IBM has since Vmcontrol 2.4 to support users to use Non-default OpenSSH
1, input in Terminal: CD ~/.ssh if-BASH:CD:/users/glamor/.ssh:no such file or directory, you have not used it before. Take the second step directly.If you have previously used the need to clean up the original RSA, execute the command: mkdir key_backup $ cp id_rsa* Key_backup $ rm id_rsa*Last Login:mon Dec 5 20:27:47 on ttys000glamordemac-mini:~ glamor$ CD ~/.ssh-BASH:CD:/users/glamor/.ssh:no such file or d
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.