Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
en:connexion_serveur_admin [2017/01/02 20:06] – Domperss | en:connexion_serveur_admin [2021/12/03 19:19] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 4: | Line 4: | ||
<WRAP center round important 60%> | <WRAP center round important 60%> | ||
The manipulation here concerns a console connection from a Linux machine. | The manipulation here concerns a console connection from a Linux machine. | ||
- | </ WRAP> | + | </ |
The advantage of connecting to a server using a public key is that you can forget the basic passwords of the servers, there is only one to remember: **yours**. This is very useful if you have several servers to administer, or if they have passwords to extend and impossible to remember. | The advantage of connecting to a server using a public key is that you can forget the basic passwords of the servers, there is only one to remember: **yours**. This is very useful if you have several servers to administer, or if they have passwords to extend and impossible to remember. | ||
Line 24: | Line 24: | ||
**Copy the key to the remote server account** | **Copy the key to the remote server account** | ||
- | < | + | |
Replace '' | Replace '' | ||
And now, it's all good! You can connect to the server via ssh with your key: | And now, it's all good! You can connect to the server via ssh with your key: | ||
- | < | + | ssh yyy@xxxxx.org |
or | or | ||
- | < | + | ssh root@myserver.org |
On the server, go to the .ssh folder of /home/user and | On the server, go to the .ssh folder of /home/user and | ||
Line 74: | Line 74: | ||
</ | </ | ||
===== Log in without password(insecure method) ===== | ===== Log in without password(insecure method) ===== | ||
- | < | + | < |
Logging in without a password potentially opens up a security vulnerability. To be reserved for very special cases! | Logging in without a password potentially opens up a security vulnerability. To be reserved for very special cases! | ||
</ | </ | ||
Line 100: | Line 100: | ||
* [[http:// | * [[http:// | ||
- | {{tag> | + | {{tag> |