詳解SSH如何配置key免密碼登錄
如何使用
直接指定ip然后-i 指定key文件,然后指定用戶
ssh 1.1.1.1 -i Test1 -l userxxx
不指定用戶實(shí)際上就是使用當(dāng)前的本機(jī)登陸的用戶名去登陸遠(yuǎn)端主機(jī),比如本地用戶是AAA,那么:
ssh 1.1.1.1 -i Test1
等同于
ssh 1.1.1.1 -i Test1 -l AAA
這里要注意,生成的key是和一對(duì)用戶綁定的,生成key的用戶以及存儲(chǔ)這個(gè)key的公鑰的遠(yuǎn)端主機(jī)的用戶。ssh的原理就是,公鑰給人家,自己留秘鑰,遠(yuǎn)端主機(jī)的其他用戶也是無法看到這個(gè)指定的用戶的接受到的公鑰的,所以用戶是一對(duì)一的。
比如我在test-server 下面的azuo1228生成key,然后拷貝到遠(yuǎn)端主機(jī)dest-server去使用,那么放在遠(yuǎn)端主機(jī)的哪個(gè) 用戶home目錄下面,對(duì)應(yīng)的遠(yuǎn)端主機(jī)的這個(gè)用戶才可以被無密碼登陸,并不等于對(duì)遠(yuǎn)端主機(jī)的其他用戶也能免密碼登陸。
開始操作
1.生成key:
[azuo1228@test-server ~]$ ssh-keygen
這里一直敲回車就好
Generating public/private rsa key pair. Enter file in which to save the key (/home/azuo1228/.ssh/id_rsa): Created directory '/home/azuo1228/.ssh'. Enter passphrase (empty for no passphrase): Enter same passphrase again: Your identification has been saved in /home/azuo1228/.ssh/id_rsa. Your public key has been saved in /home/azuo1228/.ssh/id_rsa.pub. The key fingerprint is: d2:33:66:86:0a:b4:27:a9:86:92:24:ff:13:63:96:15 azuo1228@test-server The key's randomart image is: +--[ RSA 2048]----+ | | | E | | . . | | . o .o | |..= .oo S | |++ +*. = o | |=..o.o | |o .. | | .. | +-----------------+ [azuo1228@test-server ~]$ cd .ssh/ [azuo1228@test-server .ssh]$ dir id_rsa id_rsa.pub
查看生產(chǎn)結(jié)果
[azuo1228@test-server .ssh]$ ll total 8 -rw------- 1 azuo1228 administrator 1675 Dec 21 18:11 id_rsa -rw------- 1 azuo1228 administrator 403 Dec 21 18:11 id_rsa.pub [azuo1228@test-server .ssh]$ cat id_rsa.pub ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCxp1CLe+v3L9OjlJCoBBMtQP5p2zQSACJuCD8rPRT2KQmLFznJo9ehTJQp3UfbSzAo3muudiJ9hvyL8f8hN05voXzBSyrul3v39iiqyPJGFbZhtlIsvVuHNEOVaa+StP/WVcH3nT50Y2TsIx0ikXUOVaaawHKUV3wBHlyLLANMAG8yOy4NIzCj++TO4n+66uyrgVvUf mZ02ALGGL0gUIV97tlhdwVQLG+2mJwSU0E3fksMVlhKxQrpaOx1OtObF0Xo4CmuuXAowtm/uW50gHRVYMA7N/VNgbWaa4hbypCV5m6UqF6P8bHp1Kgz0qm/U0ro1jFzNv1+fin2ZdwV1Ytr azuo1228@test-server
2.拷貝到遠(yuǎn)端主機(jī)指定用戶的home下面
可以看到這次還是要輸密碼的
[azuo1228@test-server .ssh]$ scp id_rsa.pub azuo1228@10.148.167.106:/home/azuo1228 Access and Authorization to this server is controlled by Active Directory. Please login with your admin account. azuo1228@10.148.167.106's password: id_rsa.pub 100% 403 0.4KB/s 00:00
在此測(cè)試登錄 -- 需要密碼,還沒免密碼
[azuo1228@test-server .ssh]$ ssh azuo1228@10.148.167.106 Access and Authorization to this server is controlled by Active Directory. Please login with your admin account. azuo1228@10.148.167.106's password: Last login: Wed Dec 21 18:07:21 2016 from shang1lu4gnl.ads.autodesk.com Authorized uses only. All activity may be monitored and reported. [azuo1228@dest-server ~]$
不存在.ssh的話需要?jiǎng)?chuàng)建
[azuo1228@dest-server ~]$ mkdir .ssh [azuo1228@dest-server ~]$ cd .ssh/ [azuo1228@dest-server .ssh]$ cat ../id_rsa.pub | tee -a authorized_keys ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCxp1CLe+v3L9OjlJCoBBMtQP5p2zQSACJuCD8rPRT2KQmLFznJo9ehTJQp3UfbSzAo3muudiJ9hvyL8f8hN05voXzBSyrul3v39iiqyPJGFbZhtlIsvVuHNEOVaa+StP/WVcH3nT50Y2TsIx0ikXUOVaaawHKUV3wBHlyLLANMAG8yOy4NIzCj++TO4n+66uyrgVvUfmZ02ALGGL0gUIV97tlhdwVQLG+2mJwSU0E3fksMVlhKxQrpaOx1OtObF0Xo4CmuuXAowtm/uW50gHRVYMA7N/VNgbWaa4hbypCV5m6UqF6P8bHp1Kgz0qm/U0ro1jFzNv1+fin2ZdwV1Ytr azuo1228@test-server [azuo1228@dest-server .ssh]$ ll total 4 -rw-r--r-- 1 azuo1228 administrator 403 Dec 21 20:33 authorized_keys
需要權(quán)限為600
[azuo1228@dest-server .ssh]$ chmod 600 authorized_keys [azuo1228@test-server .ssh]$ ssh azuo1228@10.148.167.106 Access and Authorization to this server is controlled by Active Directory. Please login with your admin account. Last login: Wed Dec 21 20:32:08 2016 from c72 Authorized uses only. All activity may be monitored and reported. [azuo1228@dest-server ~]$ [azuo1228@dest-server ~]$ [azuo1228@dest-server ~]$ exit logout Connection to 10.148.167.106 closed.
再次登陸,就已經(jīng)免密了
[azuo1228@test-server .ssh]$ ssh 10.148.167.106 Access and Authorization to this server is controlled by Active Directory. Please login with your admin account. Last login: Wed Dec 21 20:33:34 2016 from c72 Authorized uses only. All activity may be monitored and reported.
在嘗試登陸zhour用戶,依舊要密碼,可見免密過程是一對(duì)一的。
[azuo1228@test-server .ssh]$ ssh 10.148.167.106 -l zhour Access and Authorization to this server is controlled by Active Directory. Please login with your admin account. zhour@10.148.167.106's password:
拷貝公鑰到另一個(gè)用戶zhour
[azuo1228@test-server .ssh]$ scp id_rsa.pub zhour@10.148.167.106:/home/zhour Access and Authorization to this server is controlled by Active Directory. Please login with your admin account. zhour@10.148.167.106's password: id_rsa.pub 100% 403 0.4KB/s 00:00
登陸依舊需要密碼
[azuo1228@test-server .ssh]$ ssh 10.148.167.106 -l zhour Access and Authorization to this server is controlled by Active Directory. Please login with your admin account. zhour@10.148.167.106's password: Last login: Wed Dec 21 17:55:32 2016 from shang1lu4gnl.ads.autodesk.com Authorized uses only. All activity may be monitored and reported.
添加公鑰給zhour
[zhour@dest-server .ssh]$ cat ../id_rsa.pub | tee -a authorized_keys ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCxp1CLe+v3L9OjlJCoBBMtQP5p2zQSACJuCD8rPRT2KQmLFznJo9ehTJQp3UfbSzAo3muudiJ9hvyL8f8hN05voXzBSyrul3v39iiqyPJGFbZhtlIsvVuHNEOVaa+StP/WVcH3nT50Y2TsIx0ikXUOVaaawHKUV3wBHlyLLANMAG8yOy4NIzCj++TO4n+66uyrgVvUfmZ02ALGGL0gUIV97tlhdwVQLG+2mJwSU0E3fksMVlhKxQrpaOx1OtObF0Xo4CmuuXAowtm/uW50gHRVYMA7N/VNgbWaa4hbypCV5m6UqF6P8bHp1Kgz0qm/U0ro1jFzNv1+fin2ZdwV1Ytr azuo1228@test-server
這樣就免密了
[azuo1228@test-server .ssh]$ ssh 10.148.167.106 -l zhour Access and Authorization to this server is controlled by Active Directory. Please login with your admin account. Last login: Wed Dec 21 20:34:49 2016 from c72 Authorized uses only. All activity may be monitored and reported.
注意
需要注意兩點(diǎn),如下:
免密之后,scp這種走ssh 通道的都會(huì)免密;
key拷貝到遠(yuǎn)程主機(jī)的指定用戶home目錄下,最后,免輸入密碼的時(shí)候是遠(yuǎn)端主機(jī)的指定用戶,非本地主機(jī)的用戶
總結(jié)
以上就是這篇文章的全部?jī)?nèi)容了,希望本文的內(nèi)容對(duì)大家的學(xué)習(xí)或者工作能帶來一定的幫助,如果有疑問大家可以留言交流,謝謝大家對(duì)腳本之家的支持。
相關(guān)文章
Linux安裝PHP MongoDB驅(qū)動(dòng)
在php中使用mongodb你必須使用 mongodb 的 php驅(qū)動(dòng)。本文是小編在部署生產(chǎn)環(huán)境時(shí)候記錄的筆記,特此分享到腳本之家平臺(tái)供大家參考2016-11-11linux環(huán)境搭建圖數(shù)據(jù)庫(kù)neo4j的講解
今天小編就為大家分享一篇關(guān)于linux環(huán)境搭建圖數(shù)據(jù)庫(kù)neo4j的講解,小編覺得內(nèi)容挺不錯(cuò)的,現(xiàn)在分享給大家,具有很好的參考價(jià)值,需要的朋友一起跟隨小編來看看吧2019-04-04安裝CentOS 6.x報(bào)錯(cuò)"Disk sda contains BIOS RAID metadata"解決方法
今天在安裝CentOS6.2的時(shí)候,當(dāng)進(jìn)到檢測(cè)硬盤的時(shí)候,總是過不去,報(bào)錯(cuò)如下: Disk sda contains BIOS RAID metadata, but is not part of any recognized BIOS RAID sets. Ignoring disk sda,真是不知如何解決,下面小編把我的思路分享到腳本之家平臺(tái),需要的朋友參考下2019-11-11