Difference between revisions of "Clusters"
From HCL
(New page: == Passwordless SSH ==) |
(→Passwordless SSH) |
||
Line 1: | Line 1: | ||
== Passwordless SSH == | == Passwordless SSH == | ||
+ | |||
+ | To set up passwordless SSH, there are three main things to do: | ||
+ | * generate a pair of keys | ||
+ | * copy a public key from the source computer to the target computer's authorized_keys file | ||
+ | * check the permissions. | ||
+ | |||
+ | See here for details: | ||
+ | |||
+ | http://www.stearns.org/doc/ssh-techniques.current.html |
Revision as of 14:23, 15 February 2010
Passwordless SSH
To set up passwordless SSH, there are three main things to do:
- generate a pair of keys
- copy a public key from the source computer to the target computer's authorized_keys file
- check the permissions.
See here for details: