How to configure key-based authentication for SSH

Posted by Scott_Ruecker on May 3, 2022 9:37 PM EDT
Enable Sysadmin
Mail this story
Print this story

Remote connections to a server via Secure Shell (SSH) can be authenticated in two ways. The traditional and default method is to use password authentication. The second approach is key-based authentication, which is based on a private-public key pair.

Full Story

  Nav
» Read more about: Story Type: News Story; Groups: Linux

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.