~choose fonts and sizes~

configure key based ssh authentication in rhel 6.4 or centos 6.4 or Scientific linux 6.4 or Fedora 18

configure key based ssh authentication in rhel 6.4 or centos 6.4 or Scientific linux 6.4 or Fedora 18

Whenever you take ssh in a remote computer it prompts you for your password, which might be insecure in some cases. Configuring key based authentication for ssh server will solve this problem and provides one extra layer of security. Key based ssh is also used in cases where we configure some applications (For example: backup servers) to be able to take remote shell without giving a password but using keys.
I will use following configuration :
ssh server

1 comment:

  1. Casinos Near DC (MGM): Here's when casinos in DC
    We've teamed 통영 출장샵 up 삼척 출장마사지 with MGM Resorts International to bring you 전라남도 출장마사지 our 광주 출장마사지 handy guide 논산 출장마사지 on the best casinos in DC.

    ReplyDelete

Attention: Please don't use spammy comments here. else ur comment will be remove automatically. Thank you.