![]() ![]() You keep the private key a secret and store it on the computer you use to connect to the remote system. ![]() SSH public key authentication relies on asymmetric cryptographic algorithms that generate a pair of separate keys (a key pair), one "private" and the other "public". Using SSH public key authentication to connect to a remote system is a robust, more secure alternative to logging in with an account password or passphrase.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |