Pages

Thursday, May 30, 2013

configure key based ssh authentication in rhel 6.4 or centos 6.4 or Scientific linux 6.4 or Fedora 18

configure key based ssh authentication in rhel 6.4 or centos 6.4 or Scientific linux 6.4 or Fedora 18

Whenever you take ssh in a remote computer it prompts you for your password, which might be insecure in some cases. Configuring key based authentication for ssh server will solve this problem and provides one extra layer of security. Key based ssh is also used in cases where we configure some applications (For example: backup servers) to be able to take remote shell without giving a password but using keys.
I will use following configuration :
ssh server

0 comments:

Post a Comment