Question: Configure SSH key - based authentication Many environments require the use of SSH key - based authentication rather than password - based logins . Key
Configure SSH keybased authentication
Many environments require the use of SSH keybased authentication rather than passwordbased logins Keybased authentication is both more secure and more convenient. You will configure SSH keybased authentication between two Linux systems.
Remain logged in as the root user on the CentOS Stream CLI Applied Labs VM
Use SSH to connect to the secondary server at from centos.
Type yes and Passwrd when prompted.
Expand this content if you need help:
Notice the command prompt indicates secondary Disconnect from secondary by using the exit command.
Generate the key pair. Do not create a corresponding password.
Select the Enter key three times through all options, accepting the defaults.
Expand this content if you need help:
Run the following command to copy your public key to the remote system secondary
sshcopyid root@
Enter Passwrd when challenged.
SSH to the secondary server from centos.
Were you challenged for a password?
Use the touch command to create a file named ssh on the secondary server.
Disconnect from secondary
Confirm you created the ssh file on the secondary VM
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
