howto:sshkey
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| howto:sshkey [2025/05/12 21:51] – [Ubuntu] justip6 | howto:sshkey [2026/05/12 19:31] (current) – [Note about encrypting your keys] jnilsson | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ===== Setting up Passwordless | + | ====== Setting up SSH Public Key Authentication ====== |
| - | ==== Ubuntu | + | |
| - | === ssh-keygen | + | SSH public key authentication lets you log in to a remote Linux server without needing to type a password. Instead SSH uses a key pair: |
| - | You use the tool "ssh-keygen" | + | |
| - | < | + | * **Private key**: '' |
| - | [user@host ~]$ ssh-keygen -t ed25519 | + | * **Public |
| + | |||
| + | When you try to connect, your private key is used to authenticate you, and if your public key is set up correctly on the server, you are allowed to log in. | ||
| + | |||
| + | You can read more about SSH public key authentication here: | ||
| + | |||
| + | * [[https:// | ||
| + | |||
| + | ===== Important notes ===== | ||
| + | |||
| + | * Never share your private key. | ||
| + | * It is safe to share your public key. | ||
| + | * Your public key file usually ends in '' | ||
| + | * Confirm that SSH key login works before password login is disabled. | ||
| + | * If you need help, contact SocIT at [[socit@uci.edu]]. | ||
| + | |||
| + | ===== Step 1: Check Whether You Already Have an SSH Key ===== | ||
| + | |||
| + | If you already have an SSH key pair, you can usually reuse it ([[# | ||
| + | |||
| + | Use the code below to see if you already have files such as '' | ||
| + | |||
| + | ==== Windows Users ==== | ||
| + | |||
| + | Open **PowerShell** or **Windows Terminal** and run:< | ||
| + | dir $env: | ||
| + | </ | ||
| + | |||
| + | ==== macOS and Linux Users ==== | ||
| + | |||
| + | Open **Terminal** and run:< | ||
| + | ls ~/.ssh | ||
| + | </ | ||
| + | |||
| + | ===== Step 2: Generate an SSH Key ===== | ||
| + | |||
| + | If you do not already have an SSH key, create one using '' | ||
| + | |||
| + | ==== Windows Users ==== | ||
| + | |||
| + | Open **PowerShell** or **Windows Terminal**. Run:< | ||
| + | ssh-keygen -t ed25519 | ||
| + | </ | ||
| + | |||
| + | You will see prompts similar | ||
| + | |||
| + | < | ||
| Generating public/ | Generating public/ | ||
| - | Enter file in which to save the key (/home/user/ | + | Enter file in which to save the key (C: |
| - | Enter passphrase (empty for no passphrase): | + | Enter passphrase (empty for no passphrase): |
| - | Enter same passphrase: | + | Enter same passphrase: |
| </ | </ | ||
| - | You should leave the default values above by simply hitting Enter three times. | ||
| - | === Distributing | + | The default key files are: |
| - | The *.pub file needs to be appended | + | |
| + | < | ||
| + | #private key | ||
| + | C: | ||
| + | #public key | ||
| + | C: | ||
| + | </ | ||
| + | |||
| + | ==== macOS and Linux Users ==== | ||
| + | |||
| + | Open **Terminal**. Run:< | ||
| + | ssh-keygen -t ed25519 | ||
| + | </ | ||
| + | |||
| + | You will see prompts similar to this (simply press Enter to proceed with the default file names and without encrypting | ||
| + | |||
| + | < | ||
| + | Generating | ||
| + | Enter file in which to save the key (/ | ||
| + | Enter passphrase (empty for no passphrase): | ||
| + | Enter same passphrase: | ||
| + | </ | ||
| + | |||
| + | The default key files are: | ||
| + | |||
| + | < | ||
| + | #private key | ||
| + | ~/ | ||
| + | #public key | ||
| + | ~/ | ||
| + | </ | ||
| + | |||
| + | ==== Note about encrypting your keys ==== | ||
| + | |||
| + | If you typed a password above during key generation, then your private key is encrypted and you will be prompted for a password every time you try to use the key. This is an optional security feature, but not something covered by this guide. | ||
| + | |||
| + | ===== Step 3: Copy Your Public Key to the Server ===== | ||
| + | |||
| + | Your public key must be added to this file on the remote Linux server: | ||
| + | |||
| + | < | ||
| + | ~/ | ||
| + | </ | ||
| + | |||
| + | Use a method below to distribute your public key to the server: | ||
| + | |||
| + | ===== Option A: Ask SocIT for Help ===== | ||
| + | |||
| + | If you would like help, contact SocIT at [[socit@uci.edu]]. Please include: | ||
| + | |||
| + | * The server name you want to connect to | ||
| + | * Your username on that server | ||
| + | * The contents of your public key file. You can paste the contents of '' | ||
| + | |||
| + | * NOTE: Never share your private | ||
| + | |||
| + | ===== Option B: Use ssh-copy-id ===== | ||
| + | |||
| + | Use this method if password login is currently enabled | ||
| + | |||
| + | The '' | ||
| <code bash> | <code bash> | ||
| - | # Your pub key's filename may differ depending on whether it was ed25519 (id_ed25519.pub), | + | ssh-copy-id username@remotehost |
| - | [user@localhost ~]$ scp ~/.ssh/ | + | |
| - | Enter password for user@remotehost: | + | |
| - | [user@localhost ~]$ ssh user@remotehost | + | |
| - | Enter Password | + | |
| - | [user@remotehost ~]$ cd .ssh | + | |
| - | [user@remotehost .ssh]$ cat my_id.pub >> authorized_keys | + | |
| - | [user@remotehost .ssh]$ rm my_id.pub | + | |
| </ | </ | ||
| + | |||
| + | Replace: | ||
| + | |||
| + | * '' | ||
| + | * '' | ||
| + | |||
| + | You will be prompted for your password on the remote server. If the command is not found, use [[# | ||
| + | |||
| + | ===== Option C: Use Local Console Access ===== | ||
| + | |||
| + | Use this method if you can physically access the remote server console or otherwise log in locally. | ||
| + | |||
| + | - Copy the contents of '' | ||
| + | ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIExampleKeyDataHere my-laptop | ||
| + | </ | ||
| + | - On the remote server console, log in as your user account and run:< | ||
| + | mkdir -p ~/.ssh | ||
| + | touch ~/ | ||
| + | chmod 700 ~/.ssh | ||
| + | chmod 600 ~/ | ||
| + | </ | ||
| + | - Then append your public key to '' | ||
| + | echo " | ||
| + | </ | ||
| + | |||
| + | ===== Step 4: Test Your SSH Login ===== | ||
| + | |||
| + | After your public key has been added to the server, test your login from your local computer: | ||
| + | |||
| + | <code bash> | ||
| + | ssh username@remotehost | ||
| + | </ | ||
| + | |||
| + | If you entered a password when generating your key, then you will be prompted for this password in order to decrypt your private key. This is different from your user account password. | ||
| + | |||
| + | ===== Administrator Instructions ===== | ||
| + | |||
| + | Use this section if you are an administrator adding someone else's public key to their user account. Modify these values as needed: | ||
| + | |||
| + | <code bash> | ||
| + | USERNAME=panteater | ||
| + | TMP_PUBKEY_FILE="/ | ||
| + | |||
| + | USER_HOME=/ | ||
| + | SSH_DIR=" | ||
| + | AUTHKEY_FILE=" | ||
| + | |||
| + | # Create .ssh directory and authorized_keys file | ||
| + | sudo mkdir -p " | ||
| + | sudo touch " | ||
| + | |||
| + | # Add the key only if it is not already present | ||
| + | if ! sudo grep -Fxq -f " | ||
| + | cat " | ||
| + | fi | ||
| + | |||
| + | # Set correct permissions and ownership | ||
| + | sudo chmod 700 " | ||
| + | sudo chmod 600 " | ||
| + | sudo chown -R " | ||
| + | |||
| + | # Remove temporary public key file | ||
| + | rm -f " | ||
| + | </ | ||
| + | |||
| + | ===== Troubleshooting ===== | ||
| + | |||
| + | For more detailed troubleshooting output, use: | ||
| + | |||
| + | <code bash> | ||
| + | ssh -vv username@remotehost | ||
| + | </ | ||
| + | |||
| + | This can help identify any issues when logging in. | ||
| + | |||
| + | ===== Security Reminders ===== | ||
| + | |||
| + | * Do not share your private key. | ||
| + | * Only share your public key, the file ending in '' | ||
| + | * Use a passphrase on your private key if you want extra protection. | ||
| + | * Confirm SSH key login works before disabling password authentication. | ||
| + | * If password authentication will be disabled on a server, make sure all remote users have working SSH keys first. | ||
howto/sshkey.1747086706.txt.gz · Last modified: 2025/05/12 21:51 by justip6
