chineselkp.blogg.se

Xshell free
Xshell free












ssh]# cp authorized_keys authorized_keys.bak Then run the following command to import the public key (Public Key) into the "authorized_keys" file: Use Xshell to log in to the server, enter the "/root/.ssh/" directory, run the rz command (if there is no rz command, run yum install lrzsz to install), send key.pub to the server,

xshell free xshell free

please proper custody.Ĭlick on “ save ” Rear, A box will pop up, enter the password you just set 123456.in Click " determine ” Can 。ġ.2 Put the public key (Public Key) in the server~/.ssh/authorized_key fileĪbove The steps are just raw to make Public key and private key of process, Next It is to put the public key just generated on the server to be managed. Public key After saving, Next Private key file 。 Click on “ Export ” , Export as a private key file to open the public key just now. Pop up "New User key generation wizard "Dialog box, in the "Key Types of "Select "RSA" public key encryption algorithm, "Secret key length "Select any key length, length The longer, safety Higher, As shown below:Ĭlick "Next" and wait for the key generationĬontinue to the next step, in the "Key name Enter the file name of Key in ", I am here " id_rsa_2048(2) " in "encrypted password "Enter a password to encrypt the private key, and enter the password again to confirm, as shown below:Ĭlick "Next", the key generation is completed (Public key Format select SSH2-OpenSSH format), here is the public key, we can copy the public key and then save, or directly save the public key to a file, as shown below.Ĭlick "Save as file "Button to save the public key (Public key) to disk, the file name is" laomao ", spare. Open Xshell, click "Tools" in the menu bar, and select "(New user Key Generation Wizard)", as shown below: Configure the ssh client to log in with a key.ġ.1 Generate keys (public key and private key) Place the public key (Public Key) in the server ~/.ssh/authorized_key file ģ.

xshell free

Generate keys (public key and private key) Ģ. There are 3 steps to log in using the key:ġ. Here we introduce the key authentication method to log in to linux/unix. Among them, the password (password) authentication method is our most commonly used one. SSH login provides two authentication methods: password (password) authentication method and key authentication method.














Xshell free