Using the user key SSH host, the security is much higher than the direct input root password, specific implementation, please see the following tutorial.
PS: Operating with root permissions
1 Create an account first
Create an account Lee, belong to wheel group
After execution, a directory named Lee is generated under/home. Directory permissions are 700, the group is wheel, the user is Lee
STEP1:
On the command line, enter
Ssh-keygen-t rsa-c "Emailname@email.com"
Then all the way to enter, you can generate an SSH key file. namely Id_rsa Id_rsa.pub.
(The default directory is reflected in the build process, so be aware.) If there is no change, the default path is in the user's home directory.
1. Follow the instructions to generate the Key file.
2. Add the public key to the Gitlab SSH Keys. (on user profile page)
3. Test
Note: When SSH first connected to the server, there will be RSA password fingerprint confirmation, enter Yes accept, the connection will
-- Does mysqlssl generate the key 1checkssl enable mysqlgt; showvariableslike
-- Mysql ssl generation key 1 check if ssl has enabled mysqlgt; show variables like
-- Mysql ssl generates a key
1 check whether ssl is enabledMysql> show variables like '% ssl % ';+ --------------- + ---------- +| Variable_name | Value
We usually in Xshell use command SSH [email protected] Telnet to Linux, this will prompt us to enter the password is more troublesome, want to password-free login, we can generate the corresponding key, and then put on the remote server, the following is the specific operation.Here we generate the public
to the Authorized_keys of server BThe main thing is to change [email protected] to [email protected] so that it is easy to see which server's key, there may be more than one server key.Modify the main profile of sshd, turn off password Authentication login, use key to login.Vim/etc/ssh/sshd_configFind Passwordauthentication YesChange to Passwordauthentication No
-- Mysql ssl generates a key1 check whether ssl is enabledMysql> show variables like '% ssl % ';+ --------------- + ---------- +| Variable_name | Value |+ --------------- + ---------- +| Have_openssl | DISABLED || Have_ssl | DISABLED || Ssl_ca || Ssl_capath || Ssl_cert || Ssl_cipher || Ssl_crl || Ssl_crlpath || Ssl_key |+ --------------- + ---------- +9 rows in set (0.00 sec)2 is not enabled, so openSet the ssl parameter at the end of my. cnf and restart the mysql service.Mysql> show variables l
Tags: hinernate mysql database mysql database(1) When we were developing the SSH project, we found that we could not generate the primary foreign key relationship of one-to-one one-to-many and so on using MyEclipse's own Hibernate reverse engineering tool. Obviously the database has been built with the primary foreign key
Use Xshell to generate a key and log on to linux without a password
We usually use the command ssh user @ ip in Xshell to remotely log on to linux. This will prompt us that it is troublesome to enter the password. If we want to log on without a password, we can generate the corresponding
Some time ago in an SSH project, using sequence in Oracle as the primary key generation strategy for the object table, the step size of the sequence is configured in the database, but when the test is run, the step size of the primary key ID is found to be 50 per increment.Strange outside Google, find the following solution, when the ID of the entity class annota
In the reverse engineering of the mysql database, hinernatemysql cannot generate the primary/foreign key relationship.
(1) When we use the hibernate reverse engineering tool that comes with myeclipse for SSH development of large ※※project, it was found that the one-to-one primary key relationship could not be gene
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.