Difference between revisions of "Clusters"

From HCL
Jump to: navigation, search
(Passwordless SSH)
(Passwordless SSH)
 
Line 2: Line 2:
  
 
To set up passwordless SSH, there are three main things to do:
 
To set up passwordless SSH, there are three main things to do:
* generate a pair of keys
+
* generate a pair of public/private keys on your local computer
* copy a public key from the source computer to the target computer's authorized_keys file
+
* copy the public key from the source computer to the target computer's authorized_keys file
 
* check the permissions.
 
* check the permissions.
 +
 +
You can repeat that transitively for "A->B->C". You can use the initial pair of keys everywhere.
  
 
See here for details:
 
See here for details:
  
 
http://www.stearns.org/doc/ssh-techniques.current.html
 
http://www.stearns.org/doc/ssh-techniques.current.html

Latest revision as of 14:25, 15 February 2010

Passwordless SSH

To set up passwordless SSH, there are three main things to do:

  • generate a pair of public/private keys on your local computer
  • copy the public key from the source computer to the target computer's authorized_keys file
  • check the permissions.

You can repeat that transitively for "A->B->C". You can use the initial pair of keys everywhere.

See here for details:

http://www.stearns.org/doc/ssh-techniques.current.html