Question: Configure SSH key - based authentication Many environments require the use of SSH key - based authentication rather than password - based logins . Key

Configure SSH key-based authentication
Many environments require the use of SSH key-based authentication rather than password-based logins. Key-based authentication is both more secure and more convenient. You will configure SSH key-based authentication between two Linux systems.
Remain logged in as the root user on the CentOS 9 Stream (CLI)- Applied Labs VM.
Use SSH to connect to the secondary server at 192.168.1.101 from centos.
Type yes and Passw0rd! when prompted.
Expand this content if you need help:
Notice the command prompt indicates secondary. Disconnect from secondary by using the exit command.
Generate the key pair. Do not create a corresponding password.
Select the Enter key three times through all options, accepting the defaults.
Expand this content if you need help:
Run the following command to copy your public key to the remote system (secondary).
ssh-copy-id root@192.168.1.101
Enter Passw0rd! when challenged.
SSH to the secondary server from centos.
Were you challenged for a password?
Use the touch command to create a file named ssh on the secondary server.
Disconnect from secondary.
Confirm you created the ssh file on the secondary VM.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!