Generally nobus store your public key while your private key is downloaded by you. Ensure to keep it safe and uncompromised
Configure SSH server to login with Key-Pair Authentication.
Download a private key for client and a public key for server to do it.
|
|
[1] | Create Key-Pair for each user, so login with a common user on SSH Server Host and work like follows. |
[2] | Transfer the secret key created on the Server to a Client, then it's possbile to login with keys authentication. |
# copy the secret key to local ssh directory [username@www ~]$ sudo cp ~/path/to/your/private-key ~/.ssh/ # alternatively using scp [username@www ~]$ scp username@server_ip:/home/username/private-key ~/.ssh/ username@server_ip's password: id_rsa [username@www ~]$ ssh -i ~/.ssh/private-key username@server_ip Enter passphrase for key '/home/username/.ssh/private-key': # passphrase Last login: Wed May 19 08:04:20 2020 from www.mod.com [username@server_ip ~]$ # Just login |
[3] | It's more secureed to if you set [PasswordAuthentication no]. |
[root@server_ip ~]#
vi/etc/ssh/sshd_config# line 65: turn to [no] PasswordAuthentication no
# line 69: make sure the value is [no] ChallengeResponseAuthentication no # line 96: make sure the value is [yes] UsePAM yes systemctlrestart sshd |
For security reasons, you can't add or modify the SSH keys on your FCS Instance using the panel after you create it, but you have several options to add and modify them via the command line. If you currently have SSH access to the FCS Instance, you can upload keys:
From your local computer using ssh-copy-id
, which is included in many Linux distributions’ OpenSSH packages.
From your local computer by extracting and appending the contents of the key
into the ~/.ssh/authorized_keys
file. This is a good choice if you don't have ssh-copy-id
.
By SSHing to your FCS Instance and adding the public key manually, which is necessary if you do not have password-based SSH access.
If you currently can't connect to your FCS Instance at all, use the FCS Instance console to reset the root user password. Once logged in on the console, you can either add your key manually from the console or temporarily enable password authentication to add the key via SSH.
If you have password-based access to your FCS Instance, you can copy your SSH key using ssh-copy-id
.
Substitute the IP address of your FCS Instance.
This prompts you for the user account's password on the remote system:
After typing in the password, the contents of your ~/.ssh/id_rsa.pub
key are appended to the end of the user account's ~/.ssh/authorized_keys
file:
After entering the password, it copies your key, and you can log in without a password.
If you do not have the ssh-copy-id
utility available, but still have password-based SSH access to the remote server, you can pipe the contents of the key into the ssh
command.
On the remote side, make sure the ~/.ssh
directory exists, and then append the piped contents into the ~/.ssh/authorized_keys
file. Substitute the IP address and your username for your FCS Instance.
You are then asked to supply the password for the remote account:
After entering the password, it copies your key, and you can log in without a password.
If you do not have password-based SSH access available, you have to add your public key to the remote server manually.
ssh
to add your keys.
On your local machine, output the contents of your public key.
Copy the output.
Log in to your FCS Instance using your local terminal and create the ~/.ssh
directory if it does not already exist:
You'll need to add your SSH key to an authorized_keys
file in this directory. The public keys listed in that file are the ones that can be used to log in to the server as this user.
Create and open the ~/.ssh/authorized_keys
file for editing using a terminal-based text editor, like nano
.
Paste the contents of your SSH key into the file by right-clicking in your terminal and choosing Paste or by using a keyboard shortcut like CTRL+SHIFT+V
. Then, save and close the file. In nano
, save by pressing CTRL+O
and then ENTER
, and exit by pressing CTRL+X
.
Alternatively, instead of opening the file in an editor and pasting your key, you can create the authorized_keys
file with your public key added with a single command. If you use this, make sure to substitute the contents of your public key into the echo
command.
Once the authorized_keys
file contains the public key, you need to update permissions on some of the files. The ~/.ssh
directory and authorized_keys
file must have specific restricted permissions (700
for ~/.ssh
and 600
for authorized_keys
). If they don't, you won't be able to log in.
Make sure the permissions and ownership of the files are correct.
You can now log out of your FCS Instance. The next time you log in, you can do so without a password.