The trusted-host authentication and public-private SSH key pair authentication methods are similar and to a greater end achieve the same results.
可信主机身份验证和公私ssh密钥对身份验证方法是类似的,在很大程度上实现相同的结果。
If you have no SSH key used for a secure instance, generate a key pair before you continue.
如果没有为实例使用ssh密钥,请先生成一个密钥对,然后再继续。
You enter the same passphrase with which you created the SSH private-public key pair, and the output of the command run on the remote destination server is seen locally back on your source server.
您可以输入与在创建SSH公私密钥对时同样的口令,且在远程目标服务器上运行的命令的输出可在您本地的源服务器上看到。
If an SSH public key changes or the pair is regenerated, all of the remote hosts will need the new public key in their authorized_keys file.
如果一个SSH公钥改变或重新生成密钥对,所有远程主机将在其authorized_keys文件中需要新的公共密钥。
Let's look at how to generate, set up, and configure an SSH private and public key pair on typical Linux hosts (see figure 5).
让我们看看如何在一个典型的Linux主机上生成、设置和配置一个ssh私有和公共密钥对(参见图5)。
For the truly paranoid who refuse to create a password-less SSH public-private key pair, there's the ssh-agent utility.
对于拒绝创建无密码ssh公私密钥对的真正的偏执狂来说,有一个ssh - agent实用程序。
For the truly paranoid who refuse to create a password-less SSH public-private key pair, there's the ssh-agent utility.
对于拒绝创建无密码ssh公私密钥对的真正的偏执狂来说,有一个ssh - agent实用程序。
应用推荐