Trusted hosts: Authenticate without passwords among Linux enviornements

Sunday, March 24, 2013 ·




Source Machine: MACHINE A
Target Machine: MACHINE B

Following executed at MACHINE A (Source Machine)
        Login to the server:
su – john

2.       Create the public key:
ssh–keygen  –t  rsa

3.       Press “Enter” (without providing any input) for all 03 questions.

4.       Edit the file that is been generated (default location: /home/john/.ssh/id_rsa.pub) and copy the contents that is been generated for that particular machine.

Following executed at MACHINE B (Source Machine)
5.       Switch user
su  - john

6.       Create a file manually as “authorized_keys2

7.       Paste the entry at the target machine which was copied from Machine A (at location: /home/john/. ssh/authorized_keys2”

0 comments:

Search This Blog

About Me

I am an Oracle certified DBA and Apps DBA, totally loving my field of work. I have created this blog in order to save my studies in my field and share it with all.

View Asif Muhammad's profile on LinkedIn

Which is the most featurized database???

Followers

Site Traffic