
Permissions are important here so do not miss that step. Most sshd config files point to authorized_keys, so we make a soft link to the authorized_keys2 file. sshĪdd the client's public key to the authorized public keys on the server. They should look like:ĭrwx- 2 nz nz 4096 Sep 28 07:04. ssh directory does not exist in the home directory ( ~ ) then create it.Ĭheck the permissions on this folder (even if it exists!). Locate the following lines in the file and uncomment or change the values to match: On the remote NPS Server Īs the root user on the NPS server edit the /etc/ssh/sshd_config file. You must configure the SSHD server and import the client machine's key.

The remote machine, the NPS Server, is a Red Hat Linux OS running Open SSH. If you are doing this for multiple servers, the file begins with Host x.x.x and the commands needed are listed below it just repeat the block below and change the Host name.Ĭhange the permissions on the config file: This is done in the ~/.ssh folder (which you are still in). Your public key has been saved in /home/user/.ssh/id_rsa.pub.Ĭd:2f:d5:f9:97:15:fb:4d:aa:9d:34:3e:ed:60:18:44 a SSH config file so that you don't have to type this each time you connect. Your identification has been saved in /home/user/.ssh/id_rsa. Generate the key do not enter a passphrase (just hit enter).Įnter file in which to save the key (/home/user/.ssh/id_rsa):Įnter passphrase (empty for no passphrase): It is considered more secure, and therefore preferred, to DSA. The example uses an RSA key that only works with the SSH2 protocol (which is what is used on the NPS server).

The work is done under the user's home directory. This example uses a client with Linux OS with a OpenSSH client.

These instructions should be similar for other SSH clients on any *nix machines.Īlso included are various troubleshooting methods in case something does not work the way it is expected to. It addresses connecting from a Linux machine to the NPS server using OpenSSH. This document outlines how you can set up automatic logins via SSH using public keys.
