激情久久久_欧美视频区_成人av免费_不卡视频一二三区_欧美精品在欧美一区二区少妇_欧美一区二区三区的

服務器之家:專注于服務器技術及軟件下載分享
分類導航

云服務器|WEB服務器|FTP服務器|郵件服務器|虛擬主機|服務器安全|DNS服務器|服務器知識|Nginx|IIS|Tomcat|

服務器之家 - 服務器技術 - 服務器知識 - 詳解SSH如何配置key免密碼登錄

詳解SSH如何配置key免密碼登錄

2022-01-06 15:39多客博圖 服務器知識

這篇文章主要介紹了詳解SSH如何配置key免密碼登錄的相關資料,文中介紹的非常詳細,對大家的學習或者工作具有一定的參考價值,需要的朋友們下面來一起看看吧。

如何使用

直接指定ip然后-i 指定key文件,然后指定用戶

?
1
ssh 1.1.1.1 -i Test1 -l userxxx

不指定用戶實際上就是使用當前的本機登陸的用戶名去登陸遠端主機,比如本地用戶是AAA,那么:

?
1
ssh 1.1.1.1 -i Test1

等同于

?
1
ssh 1.1.1.1 -i Test1 -l AAA

這里要注意,生成的key是和一對用戶綁定的,生成key的用戶以及存儲這個key的公鑰的遠端主機的用戶。ssh的原理就是,公鑰給人家,自己留秘鑰,遠端主機的其他用戶也是無法看到這個指定的用戶的接受到的公鑰的,所以用戶是一對一的。

比如我在test-server 下面的azuo1228生成key,然后拷貝到遠端主機dest-server去使用,那么放在遠端主機的哪個 用戶home目錄下面,對應的遠端主機的這個用戶才可以被無密碼登陸,并不等于對遠端主機的其他用戶也能免密碼登陸。

開始操作

1.生成key:

?
1
[azuo1228@test-server ~]$ ssh-keygen

這里一直敲回車就好

?
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
Generating public/private rsa key pair.
Enter file in which to save the key (/home/azuo1228/.ssh/id_rsa):
Created directory '/home/azuo1228/.ssh'.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/azuo1228/.ssh/id_rsa.
Your public key has been saved in /home/azuo1228/.ssh/id_rsa.pub.
The key fingerprint is:
d2:33:66:86:0a:b4:27:a9:86:92:24:ff:13:63:96:15 azuo1228@test-server
The key's randomart image is:
+--[ RSA 2048]----+
|   |
| E  |
| . .  |
| . o .o  |
|..= .oo S |
|++ +*. = o |
|=..o.o  |
|o ..  |
| ..  |
+-----------------+
[azuo1228@test-server ~]$ cd .ssh/
[azuo1228@test-server .ssh]$ dir
id_rsa id_rsa.pub

查看生產結果

?
1
2
3
4
5
6
7
[azuo1228@test-server .ssh]$ ll
total 8
-rw------- 1 azuo1228 administrator 1675 Dec 21 18:11 id_rsa
-rw------- 1 azuo1228 administrator 403 Dec 21 18:11 id_rsa.pub
[azuo1228@test-server .ssh]$ cat id_rsa.pub
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCxp1CLe+v3L9OjlJCoBBMtQP5p2zQSACJuCD8rPRT2KQmLFznJo9ehTJQp3UfbSzAo3muudiJ9hvyL8f8hN05voXzBSyrul3v39iiqyPJGFbZhtlIsvVuHNEOVaa+StP/WVcH3nT50Y2TsIx0ikXUOVaaawHKUV3wBHlyLLANMAG8yOy4NIzCj++TO4n+66uyrgVvUf
mZ02ALGGL0gUIV97tlhdwVQLG+2mJwSU0E3fksMVlhKxQrpaOx1OtObF0Xo4CmuuXAowtm/uW50gHRVYMA7N/VNgbWaa4hbypCV5m6UqF6P8bHp1Kgz0qm/U0ro1jFzNv1+fin2ZdwV1Ytr azuo1228@test-server

2.拷貝到遠端主機指定用戶的home下面

可以看到這次還是要輸密碼的

?
1
2
3
4
[azuo1228@test-server .ssh]$ scp id_rsa.pub azuo1228@10.148.167.106:/home/azuo1228
Access and Authorization to this server is controlled by Active Directory. Please login with your admin account.
azuo1228@10.148.167.106's password:
id_rsa.pub 100% 403 0.4KB/s 00:00

在此測試登錄 -- 需要密碼,還沒免密碼

?
1
2
3
4
5
6
[azuo1228@test-server .ssh]$ ssh azuo1228@10.148.167.106
Access and Authorization to this server is controlled by Active Directory. Please login with your admin account.
azuo1228@10.148.167.106's password:
Last login: Wed Dec 21 18:07:21 2016 from shang1lu4gnl.ads.autodesk.com
Authorized uses only. All activity may be monitored and reported.
[azuo1228@dest-server ~]$

不存在.ssh的話需要創建

?
1
2
3
4
5
6
7
[azuo1228@dest-server ~]$ mkdir .ssh
[azuo1228@dest-server ~]$ cd .ssh/
[azuo1228@dest-server .ssh]$ cat ../id_rsa.pub | tee -a authorized_keys
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCxp1CLe+v3L9OjlJCoBBMtQP5p2zQSACJuCD8rPRT2KQmLFznJo9ehTJQp3UfbSzAo3muudiJ9hvyL8f8hN05voXzBSyrul3v39iiqyPJGFbZhtlIsvVuHNEOVaa+StP/WVcH3nT50Y2TsIx0ikXUOVaaawHKUV3wBHlyLLANMAG8yOy4NIzCj++TO4n+66uyrgVvUfmZ02ALGGL0gUIV97tlhdwVQLG+2mJwSU0E3fksMVlhKxQrpaOx1OtObF0Xo4CmuuXAowtm/uW50gHRVYMA7N/VNgbWaa4hbypCV5m6UqF6P8bHp1Kgz0qm/U0ro1jFzNv1+fin2ZdwV1Ytr azuo1228@test-server
[azuo1228@dest-server .ssh]$ ll
total 4
-rw-r--r-- 1 azuo1228 administrator 403 Dec 21 20:33 authorized_keys

需要權限為600

?
1
2
3
4
5
6
7
8
9
10
11
[azuo1228@dest-server .ssh]$ chmod 600 authorized_keys
 
[azuo1228@test-server .ssh]$ ssh azuo1228@10.148.167.106
Access and Authorization to this server is controlled by Active Directory. Please login with your admin account.
Last login: Wed Dec 21 20:32:08 2016 from c72
Authorized uses only. All activity may be monitored and reported.
[azuo1228@dest-server ~]$
[azuo1228@dest-server ~]$
[azuo1228@dest-server ~]$ exit
logout
Connection to 10.148.167.106 closed.

再次登陸,就已經免密了

?
1
2
3
4
[azuo1228@test-server .ssh]$ ssh 10.148.167.106
Access and Authorization to this server is controlled by Active Directory. Please login with your admin account.
Last login: Wed Dec 21 20:33:34 2016 from c72
Authorized uses only. All activity may be monitored and reported.

在嘗試登陸zhour用戶,依舊要密碼,可見免密過程是一對一的。

?
1
2
3
[azuo1228@test-server .ssh]$ ssh 10.148.167.106 -l zhour
Access and Authorization to this server is controlled by Active Directory. Please login with your admin account.
zhour@10.148.167.106's password:

拷貝公鑰到另一個用戶zhour

?
1
2
3
4
5
[azuo1228@test-server .ssh]$ scp id_rsa.pub zhour@10.148.167.106:/home/zhour
 
Access and Authorization to this server is controlled by Active Directory. Please login with your admin account.
zhour@10.148.167.106's password:
id_rsa.pub  100% 403 0.4KB/s 00:00

登陸依舊需要密碼

?
1
2
3
4
5
[azuo1228@test-server .ssh]$ ssh 10.148.167.106 -l zhour
Access and Authorization to this server is controlled by Active Directory. Please login with your admin account.
zhour@10.148.167.106's password:
Last login: Wed Dec 21 17:55:32 2016 from shang1lu4gnl.ads.autodesk.com
Authorized uses only. All activity may be monitored and reported.

添加公鑰給zhour

?
1
2
3
[zhour@dest-server .ssh]$ cat ../id_rsa.pub | tee -a authorized_keys
 
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCxp1CLe+v3L9OjlJCoBBMtQP5p2zQSACJuCD8rPRT2KQmLFznJo9ehTJQp3UfbSzAo3muudiJ9hvyL8f8hN05voXzBSyrul3v39iiqyPJGFbZhtlIsvVuHNEOVaa+StP/WVcH3nT50Y2TsIx0ikXUOVaaawHKUV3wBHlyLLANMAG8yOy4NIzCj++TO4n+66uyrgVvUfmZ02ALGGL0gUIV97tlhdwVQLG+2mJwSU0E3fksMVlhKxQrpaOx1OtObF0Xo4CmuuXAowtm/uW50gHRVYMA7N/VNgbWaa4hbypCV5m6UqF6P8bHp1Kgz0qm/U0ro1jFzNv1+fin2ZdwV1Ytr azuo1228@test-server

這樣就免密了

?
1
2
3
4
[azuo1228@test-server .ssh]$ ssh 10.148.167.106 -l zhour
Access and Authorization to this server is controlled by Active Directory. Please login with your admin account.
Last login: Wed Dec 21 20:34:49 2016 from c72
Authorized uses only. All activity may be monitored and reported.

注意

需要注意兩點,如下:

免密之后,scp這種走ssh 通道的都會免密;

key拷貝到遠程主機的指定用戶home目錄下,最后,免輸入密碼的時候是遠端主機的指定用戶,非本地主機的用戶

總結

以上就是這篇文章的全部內容了,希望本文的內容對大家的學習或者工作能帶來一定的幫助,如果有疑問大家可以留言交流,謝謝大家對服務器之家的支持。

原文鏈接:http://www.doocr.com/articles/58c3a904827a1a6753add53a

延伸 · 閱讀

精彩推薦
Weibo Article 1 Weibo Article 2 Weibo Article 3 Weibo Article 4 Weibo Article 5 Weibo Article 6 Weibo Article 7 Weibo Article 8 Weibo Article 9 Weibo Article 10 Weibo Article 11 Weibo Article 12 Weibo Article 13 Weibo Article 14 Weibo Article 15 Weibo Article 16 Weibo Article 17 Weibo Article 18 Weibo Article 19 Weibo Article 20 Weibo Article 21 Weibo Article 22 Weibo Article 23 Weibo Article 24 Weibo Article 25
主站蜘蛛池模板: 日本一区二区三区四区高清视频 | 中文字幕极速在线观看 | 特片网久久 | 久久久www视频| 国产精品一区二区三区在线看 | 日本a v免费观看 | 国产精品久久久久久久久粉嫩 | 色综合久久久久久久久久 | 免费看一级片 | 久久久久99一区二区三区 | 国产99久久久久久免费看农村 | 最近日本电影hd免费观看 | 天堂在线资源av | 西川av在线一区二区三区 | 一级做a爱片性色毛片 | 午夜精品久久久久久中宇 | 成人不卡 | 凹凸成人精品亚洲精品密奴 | 精品一区在线视频 | 毛片大全免费看 | www.99av| 成人在线视频免费看 | 国产深夜福利视频在线播放 | 九九热精品视频在线 | 欧美片一区二区 | 日本高清在线免费 | 91高清视频在线观看 | 成人免费网站在线观看视频 | 激情综合视频 | 国产一区二区视频精品 | 久久久久亚洲精品国产 | 日日狠狠久久偷偷四色综合免费 | 九九热在线视频免费观看 | 欧美日本一区二区 | 国产九色在线观看 | 中文字幕xxx | 高清国产在线 | 免费淫视频 | 亚洲一区二区三区视频 | 久久久久北条麻妃免费看 | 精品免费久久 |