Home PC Games Linux Windows Database Network Programming Server Mobile  
  Home \ Linux \ Ubuntu 14.04 How to set up an SSH without password     - SVN hook code set to synchronize Web directory (Server)

- Kubernetes (k8s) environment to build combat (Server)

- To compile install and test Swift under Linux (Linux)

- Linux5 install MySQL 5.6 (RPM mode) (Database)

- Iptables in Ubuntu (Linux)

- ORA-00020: No more process state objects available (Database)

- Docker command Detailed (Linux)

- Oracle in the add & split partition on the impact of global & local index (Database)

- Puppet centralized configuration management system (Server)

- Linux Creating a new user error Creating mailbox file: File exists (Linux)

- Get and Post requests Comments (Linux)

- RAID configuration and management under linux (Server)

- Turning off the interface eth0: error: Disconnect the device 'eth0' (Linux)

- Install the open source database PostgreSQL 9.4 and phpMyAdmin on Ubuntu (Database)

- stat - Get more information than ls (Linux)

- Java rewrite equals method (Programming)

- Setup Qt development environment under Linux (Linux)

- Ubuntu 12.04 LTS installation configuration JDK1.6.0_45 (Linux)

- To install HDRMerge 0.4.3 under ubuntu (Linux)

- JDK comes with tools jinfo (Linux)

  Ubuntu 14.04 How to set up an SSH without password
  Add Date : 2018-11-21      
  Hello everyone, today I come to tell you how to set up SSH on Ubuntu 14.04 without password feature. Only on the workstation has the correct (public and private) key pair for match SSH server will allow you to log in, otherwise access will not be allowed.

Under normal circumstances, we need to connect to the SSH console input user names and passwords for the job. If they are all correct, we can access, otherwise access is denied the service side. In contrast, however, there is a more secure than using a password login, we can login through SSH encryption key without password.

If you want to enable the safe way, we simply disable the password and encryption key is only allowed to log on. When using this mode, it will produce a pair of private and public keys on the client computer. Then the client must upload the public key to the SSH server's authorized_key file. Before granting access to the server and the client computer verifies that the key pair. If a match private-public key with an agent on the server end, submitted access is granted. Otherwise, access is denied.

It is certified to the SSH server is very safe a practice, if you want to implement a single SSH user login secure login, which is highly respected way. Here a quick go over how to enable non-password configuration of SSH.

1. Install the server Openssh

First, we need to update our local library index. So the following findings, we need to enter "apt-get update"

$ Sudo apt-get update

Now we can through the following command to install openssh-server:

$ Sudo apt-get install openssh-server

2. Turn openssh Service

In OpenSSH has been successfully installed after Ubuntu14.04 operating system, we have to start the OpenSSH service. The following command allows you to start / open service.

$ Sudo service ssh start

$ Sudo /etc/init.d/ssh start

3. Configure key pair

After we install and start the OpenSSH service. Now we finally get to the public and private key of the time, run the following command in Terminal:

$ Ssh-keygen -t rsa
After running the above command the future, we need to answer a series of questions. First select the path to save the key, press the Enter will select the default path that is a hidden file .ssh home directory folder. The next prompt is to ask for a password reminder. I personally leave this blank (just press Enter). After the key pair is created, it's done.

In the key of the future generation, we need to copy the public key to the SSH client on the server or host, to create a client relationship of trust. Run the following command to copy the client's public key to the server.

$ Ssh-copy-id user @ ip_address
After uploading the public key, we can disable the password by way of SSH. To do this, we need to open the / etc / ssh / ssh_config with a text editor using the following command.

$ Sudo nano / etc / ssh / sshd_config
Now, we need to follow the lines shown below to remove the comments and make some assignments.

4. Restart the SSH service

Finally, after we finished configuring SSH server, in order for the changes to take effect we need to restart the SSH service. In a terminal or console run the following command to restart.

$ Sudo service ssh restart

$ Sudo /etc/init.d/ssh restart
Restarting ssh

Now, we can only try without a password key pair ssh server a log.

to sum up

Great! Our success is configured without password SSH. Using an encryption key for an SSH server authentication is very safe a practice, if you want to implement a single user login SSH secure authentication and this is highly respected way.
- Linux Firewall Basics (Linux)
- How to statistical data of various size Redis (Database)
- How to Set Free SSH password on CentOS / RHEL (Linux)
- Compile and install Memcached can not find GCC (Programming)
- PostgreSQL log classification and management (Database)
- Java keyword final, static (Programming)
- Create RAID 1 (mirroring) with two disks (Linux)
- How to create SWAP files in Ubuntu 14.04 (Linux)
- Ubuntu UFW firewall settings Introduction (Linux)
- MySQL master-slave delay problem (Database)
- CentOS7 installation configuration Redis-3.0.0 (Database)
- Linux disk partition, format, mount the directory (Linux)
- RCU lock in the evolution of the Linux kernel (Linux)
- MySQL main and backup replication structures (using mysqld_multi) (Database)
- Python uses multi-process pool (Programming)
- How to Install Telegram instant messaging software on Ubuntu (Linux)
- Java threads and thread pools (Programming)
- Oracle Data File Management (Database)
- Use apt-p2p up a local Debian package cache (Server)
- The several technical presentation Raid under Linux (Linux)
  CopyRight 2002-2022 newfreesoft.com, All Rights Reserved.