SSH Tanpa Password
Berikut ini akan diuraikan bagaimana melakukan koneksi menggunakan ssh dalam satu komputer menggunakan user yang berbeda (user1 dan user2) tanpa mengetikkan password.
Langkah-langkahnya adalah sbb:
1. Buat sepasang key menggunakan ssh-keygen pada user1
[user1@server ~]$ ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/home/user1/.ssh/id_rsa):
Created directory '/home/user1/.ssh'.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/user1/.ssh/id_rsa.
Your public key has been saved in /home/user1/.ssh/id_rsa.pub.
The key fingerprint is:
9d:25:d1:08:3b:fd:57:d4:40:1a:4d:7e:62:06:6c:78 user1@server
2. Buat direktori .ssh pada user2
[user1@server ~]$ ssh -l user2 server mkdir -p .ssh
The authenticity of host 'server (127.0.0.1)' can't be established.
RSA key fingerprint is eb:a1:25:72:1e:f8:8b:58:a4:cb:d6:b1:43:92:d9:b1.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added 'server' (RSA) to the list of known hosts.
user2@server's password:
3. Copy kunci publik user1 ke folder .ssh pada user2@server dengan nama authorized_keys
[user1@server ~]$ cat .ssh/id_rsa.pub | ssh -l user2 server 'cat >> .ssh/authorized_keys'
user2@server's password:
4. login sbg user2
[user1@server ~]$ ssh -l user2 server
user2@server's password:
5. Lakukan chmod 700 pada direktori .ssh dan juga file autorized_keys pada user2
[user2@server ~]$ chmod 700 .ssh
[user2@server ~]$ chmod 600 .ssh/authorized_keys
6. Sekarang coba lagi lakukan login sebagai user2 menggunakan ssh
[user1@server ~]$ ssh -l user2 server
Last login: Tue Aug 1 10:50:04 2006 from server
[user2@server ~]$
Violaaaaaaaaaa.... berhasilllll
Berikut ini akan diuraikan bagaimana melakukan koneksi menggunakan ssh dalam satu komputer menggunakan user yang berbeda (user1 dan user2) tanpa mengetikkan password.
Langkah-langkahnya adalah sbb:
1. Buat sepasang key menggunakan ssh-keygen pada user1
[user1@server ~]$ ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/home/user1/.ssh/id_rsa):
Created directory '/home/user1/.ssh'.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/user1/.ssh/id_rsa.
Your public key has been saved in /home/user1/.ssh/id_rsa.pub.
The key fingerprint is:
9d:25:d1:08:3b:fd:57:d4:40:1a:4d:7e:62:06:6c:78 user1@server
2. Buat direktori .ssh pada user2
[user1@server ~]$ ssh -l user2 server mkdir -p .ssh
The authenticity of host 'server (127.0.0.1)' can't be established.
RSA key fingerprint is eb:a1:25:72:1e:f8:8b:58:a4:cb:d6:b1:43:92:d9:b1.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added 'server' (RSA) to the list of known hosts.
user2@server's password:
3. Copy kunci publik user1 ke folder .ssh pada user2@server dengan nama authorized_keys
[user1@server ~]$ cat .ssh/id_rsa.pub | ssh -l user2 server 'cat >> .ssh/authorized_keys'
user2@server's password:
4. login sbg user2
[user1@server ~]$ ssh -l user2 server
user2@server's password:
5. Lakukan chmod 700 pada direktori .ssh dan juga file autorized_keys pada user2
[user2@server ~]$ chmod 700 .ssh
[user2@server ~]$ chmod 600 .ssh/authorized_keys
6. Sekarang coba lagi lakukan login sebagai user2 menggunakan ssh
[user1@server ~]$ ssh -l user2 server
Last login: Tue Aug 1 10:50:04 2006 from server
[user2@server ~]$
Violaaaaaaaaaa.... berhasilllll
No comments:
Post a Comment