Learn to establish Public Key Authentication in Linux CentOS 8. In this lesson, you will learn to generate public and private shh key in Linux. Private key will be stored on the host machine and public key will be shared to the remote machines where you want to connect through ssh with public key. Public key establishes the encrypted connection between the host and remote machine. Private key does the decryption of those keys to see if there is match between the public keys of host and the remote machine.
After establishing the public key authentication, you will need to provide the password of the remote machine anymore. Public key will automatically connect your machine to the remote machine. So, after establishing the public key authentication, you can disable the Password Authentication on the remote machine so that only the machine with public key can connect to the remote machine. Password can be hacked anytime, therefore Password Authentication is not a secure method. Therefore, Public key Authentication are really powerful in terms of security.
Linux CentOS 8 tutorials: • #1 - Introduction of L...
Facebook: / techvitals
Негізгі бет #26 - Networking - SSH Key Authentication - Public & Private Key on Linux CentOS 8
Пікірлер: 5