how can i login without password through ssh
Answers were Sorted based on User's Feedback
Answer / chetan
First log in on A as user a and generate a pair of authentication keys. Do not enter a passphrase:
a@A:~> ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/home/a/.ssh/id_rsa):
Created directory '/home/a/.ssh'.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/a/.ssh/id_rsa.
Your public key has been saved in /home/a/.ssh/id_rsa.pub.
The key fingerprint is:
3e:4f:05:79:3a:9f:96:7c:3b:ad:e9:58:37:bc:37:e4 a@A
Now use ssh to create a directory ~/.ssh as user b on B. (The directory may already exist, which is fine):
a@A:~> ssh b@B mkdir -p .ssh
b@B's password:
Finally append a's new public key to b@B:.ssh/authorized_keys and enter b's password one last time:
a@A:~> cat .ssh/id_rsa.pub | ssh b@B 'cat >> .ssh/authorized_keys'
b@B's password:
From now on you can log into B as b from A as a without password:
a@A:~> ssh b@B hostname
B
A note from one of our readers: Depending on your version of SSH you might also have to do the following changes:
Put the public key in .ssh/authorized_keys2
Change the permissions of .ssh to 700
Change the permissions of .ssh/authorized_keys2 to 640
| Is This Answer Correct ? | 0 Yes | 1 No |
What kind of cables can be called UTP cables ?
Name 2 routing protocols that are used among relatively small networks:
Which of the following is FQDN ? a. www.mydomain.com b. mydomain.com c. www.mydomain.com.
What protocol is used to convert IP addresses to MAC addresses ? a. IP b. ARP c. RARP d. InARP e. appletalk
What is DTE and DCE in terms of Router Configuration and what is the purpose of DTE and DCE differentiate?
2 examples of DCE devices ? a. modems b. routers c. computers d. interface cards
What protocol counts hops from router to router to find the shortest path? a. DHCP b. RIP c. SNMP d. IP e. DLC
Have you configured an NIS server/client ?
Can you perform the OSI model seven layer functions in either two layer or three layer.
what is the network?
What is the name of the unique identifier encoded in the NIC? a. MAC address b. IP address.
This type of access method is generally used by Ethernet to regulate network traffic on a main cable segment.