Difference between revisions of "Clusters"
From HCL
(New page: == Passwordless SSH ==) |
(→Passwordless SSH) |
||
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
== Passwordless SSH == | == Passwordless SSH == | ||
+ | |||
+ | To set up passwordless SSH, there are three main things to do: | ||
+ | * generate a pair of public/private keys on your local computer | ||
+ | * copy the public key from the source computer to the target computer's authorized_keys file | ||
+ | * check the permissions. | ||
+ | |||
+ | You can repeat that transitively for "A->B->C". You can use the initial pair of keys everywhere. | ||
+ | |||
+ | See here for details: | ||
+ | |||
+ | http://www.stearns.org/doc/ssh-techniques.current.html |
Latest revision as of 14:25, 15 February 2010
Passwordless SSH
To set up passwordless SSH, there are three main things to do:
- generate a pair of public/private keys on your local computer
- copy the public key from the source computer to the target computer's authorized_keys file
- check the permissions.
You can repeat that transitively for "A->B->C". You can use the initial pair of keys everywhere.
See here for details: