Next, open putty and click on connection. Step two: connect to the server with PuTTY Later you need to upload or paste this public key in the remote server. Before saving the public key, you can copy the public key from the key generator and paste in a text file. Otherwise, type your keyphrase and save both the keys. If you do not want to use keyphrase then just click on save private key and save public key. Your key phrase can be anything such as “mykeysareblue” or anything that you can easily remember. Once key generation completes, you can write your passphrase in the keyphrase box if you want to. Next, go to your all program click on Run PuTTYgen and then click on “generate” button and hover your mouse in the empty space as shown in the screenshot below:īy hovering mouse in the empty space in the PuTTY key generator, you generate some random data for creating a unique key pair, which will not be reproducible by anyone else because of the randomness of your mouse waving. Upload the public key to the remote server that you want to access remotely.ĭownload from and install it in your computer. SSH key generation process:To generate keys you need to remember the following steps:At first generate public and private keys using PuTTYkeygenSave the public and private key in your computer. So, always pay attention to the secrecy of the private key. Note: even if someone has your paraphrase they cannot access your server unless they have your private key. Paraphrase is not mandatory, but it adds an extra security to your keys. If you want to remember anything like password you can create a memorable passphrase when you generate your keys. You do not need to remember any password. Therefore, only when the public key will see your private key it will allow you to use the server. Remember that public and private keys are generated in pairs and that pairing is unique. The unique combination of the public and private key allows access to the server. When a server has your public key you can access that server remotely from your computer if your computer has the private key stored in it. There is no problem in sharing public key with other. The public is shared with the host or the server that you want to connect to. A private key must be kept secret and should be kept in the computer that you will use for remote logon purpose. The main idea behind SSH key based log is that you will have two keys: private key and public key. You can make your server access more secure by generating SSH key pair. Are there any better ways to make your server access more secure? The answer is positive. You will always feel that someone may break your password and get privileged access to your server. Though it is always possible to login in your server using username and password, but you always remain vulnerable to brute force attack.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |