![]() So, always pay attention to the secrecy of the private key. Note: even if someone has your paraphrase they cannot access your server unless they have your private key. Paraphrase is not mandatory, but it adds an extra security to your keys. If you want to remember anything like password you can create a memorable passphrase when you generate your keys. ![]() You do not need to remember any password. Therefore, only when the public key will see your private key it will allow you to use the server. Remember that public and private keys are generated in pairs and that pairing is unique. The unique combination of the public and private key allows access to the server. When a server has your public key you can access that server remotely from your computer if your computer has the private key stored in it. There is no problem in sharing public key with other. The public is shared with the host or the server that you want to connect to. A private key must be kept secret and should be kept in the computer that you will use for remote logon purpose. The main idea behind SSH key based log is that you will have two keys: private key and public key. You can make your server access more secure by generating SSH key pair. Are there any better ways to make your server access more secure? The answer is positive. You will always feel that someone may break your password and get privileged access to your server. Though it is always possible to login in your server using username and password, but you always remain vulnerable to brute force attack.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |