Difference between revisions of "Clusters"
From HCL
(→Passwordless SSH) |
(→Passwordless SSH) |
||
Line 2: | Line 2: | ||
To set up passwordless SSH, there are three main things to do: | To set up passwordless SSH, there are three main things to do: | ||
− | * generate a pair of keys | + | * generate a pair of public/private keys on your local computer |
− | * copy | + | * copy the public key from the source computer to the target computer's authorized_keys file |
* check the permissions. | * check the permissions. | ||
+ | |||
+ | You can repeat that transitively for "A->B->C". You can use the initial pair of keys everywhere. | ||
See here for details: | See here for details: | ||
http://www.stearns.org/doc/ssh-techniques.current.html | http://www.stearns.org/doc/ssh-techniques.current.html |
Latest revision as of 14:25, 15 February 2010
Passwordless SSH
To set up passwordless SSH, there are three main things to do:
- generate a pair of public/private keys on your local computer
- copy the public key from the source computer to the target computer's authorized_keys file
- check the permissions.
You can repeat that transitively for "A->B->C". You can use the initial pair of keys everywhere.
See here for details: