Connection to remote system using secure keys can be accomplished by various tools such as RDP and SSH clients. Remote machine has to create a key based on the credentials and this has to be used, while doing the remote connection.
When we used to connect using SSH clients, permission to the file plays a role in connection to the remote system, even if all of the rest are fine.
This will create a panic and will get the work to stop unless until the the file permissions meet the required credentials.
It is quite easy and we have to confirm that the current user alone should have read permission and rest of the users or groups should not have any permission.
This can be achieved by running the following command:
This will do the necessary credential changes and the command "ls -l" would get the following like,
Now, you can connect to the remote system using SSH, like
When we used to connect using SSH clients, permission to the file plays a role in connection to the remote system, even if all of the rest are fine.
This will create a panic and will get the work to stop unless until the the file permissions meet the required credentials.
It is quite easy and we have to confirm that the current user alone should have read permission and rest of the users or groups should not have any permission.
This can be achieved by running the following command:
chmod 400 privatekeyfile.pem
This will do the necessary credential changes and the command "ls -l" would get the following like,
-r-------- 1 user group 1678 Dec 6 15:07 privatekeyfile.pem
Now, you can connect to the remote system using SSH, like
ssh -i privatekeyfile.pem user@servername
No comments:
Post a Comment