当前位置:网站首页>Configure SSH certificate login
Configure SSH certificate login
2022-07-04 11:13:00 【juno】
1、 Generate Certificate
cd To home/.ssh Catalog , without ,mkdir .ssh Create a .
ssh-keygen Enter all the way , Generate Certificate .
cat id_rsa > authorized_keys
Modify file permissions to 0600
2、 Copy the private key to the computer host
Copy id_rsa To your computer host .ssh Catalog . The file name does not change .
Modify the authority to 0600
At this time, you can log in directly with a certificate
边栏推荐
- Locust learning record I
- Polymorphic system summary
- Design and common methods of test case documents
- QQ get group member operation time
- Day7 list and dictionary jobs
- Heartbeat error attempted replay attack
- Usage of case when then else end statement
- Is Sanli futures safe? How to open a futures account? How to reduce the handling charge of futures at present?
- Installation of ES plug-in in Google browser
- XMIND installation
猜你喜欢

QQ group collection

Write a thread pool by hand, and take you to learn the implementation principle of ThreadPoolExecutor thread pool

Replace() function

TS type gymnastics: illustrating a complex advanced type

Canoe - the third simulation project - bus simulation-1 overview

OSI seven layer reference model

Fundamentals of software testing

Climb Phoenix Mountain on December 19, 2021

Performance test method

Function introduction of canbedded component
随机推荐
Configure SSH key to realize login free
If function in SQL
Local MySQL forgot the password modification method (Windows)
Polymorphic system summary
I What is security testing
QQ group administrators
LVS+Keepalived实现四层负载及高可用
Swagger and OpenAPI
1. Circular nesting and understanding of lists
DNS hijacking
R built in data set
The most ideal automated testing model, how to achieve layering of automated testing
Summary of automated testing framework
First article
2、 Operators and branches
Canoe - the second simulation engineering - xvehicle - 2 panel design (operation)
Daemon xinted and logging syslogd
Terms related to hacker technology
JMeter correlation technology
Application and Optimization Practice of redis in vivo push platform