...
The preferred method of authenticating users for accessing the system is through the use of SSH keys. The user generates their own key pair and sends the public key portion to the server administrator for enabling the account.
Creating SSH key pair
The user being authenticated needs to generate the key pair. It is the responsibility of the user to secure and keep secret the secret key portion of the key pair.
From a terminal, generate the SSH key pair. This will generate two files, a private key file (e.g.,
~/.ssh/id_rsa
) and a public key file (e.g.,~/.ssh/id_rsa.pub
).Code Block ssh-keygen -t rsa