This is an old revision of the document!
SSH Access
You can make it easier accessing Linux systems when you use SSH keys, they are alos more secure and the recommended access method.
You need to create first an SSH key and then add the public part in the .ssh/authorized_keys
file in your home directory on the remote system.
Creating a new key is simple with ssh-keygen:
ssh-keygen -t ed25519
This will create a private and public (default would be id_ed25519 and id_ed25519.pub, respectively) keys in your ~/.ssh folder. The *.pub key is the one you need to distribute.
There is a helper script on most Linux system to aid you with that:
ssh-copy-id -i ~/.ssh/id_ed25519.pub username@remote_system
Choose a difficult and long passphrase, you do not have to type it often as most Linux have an ssh-agent setup. You only need to “unlock” the key once (!) on your local PC. From then on you can have password free logins to all systems where you added your SSH public key.
If you logout and login again, most desktop environments will ask you to provide the passphrase to unlock your key(s).
If not, you can unlock the key in the terminal with the command ssh-add
.
You can also “forward” keys from one server to the next, i.e. if you use a jump host. Then use the -A
parameter with the ssh
command.
A nice tutorial from DigitalOcean can be found here, another one is from OpenSUSE.
If you have lots of different systems you can make it easire by providing shortcuts in the .ssh/config
file.
Host dix Hostname dix.fkp.physik.tu-darmstadt.de ForwardAgent yes User KnechtRootrecht IdentityFile ~/.ssh/my_seperate_key_only_for_dix IdentitiesOnly yes Host dax Hostname dax.fkp.physik.tu-darmstadt.de User otheruser