![]() |
| |||||||||
|
Key GenerationIf you are going to connect to a remote host computer using public-key authentication, you will have to generate your key pair before connecting. Public-key authentication is based on the use of digital signatures. Each user creates a pair of 'key' files. One of these key files is the user's public key, and the other is the user's private key. The server knows the user's public key, and only the user has the private key. When the user tries to authenticate herself, the server checks for matching public keys and sends a challenge to the user end. The user is authenticated by signing the challenge using her private key. Remember that your private key file is used to authenticate you. Never expose your private keys. If anyone else can access your private key file, they can attempt to login to the remote host computer as you, and claim to be you. Therefore it is extremely important that you keep your private key file in a secure place and make sure that no one else has access to it. Do not use public-key authentication on a computer that is shared with other users. Generate keys only on your personal computer that no one else can access! In order to use public-key authentication, you must first generate your own key pair. You can generate your own key files with the help of a built-in key generation wizard.
Key Generation WizardKey Generation - StartKey Generation - Key PropertiesKey Generation - GenerationKey Generation - Enter PassphraseKey Generation - Finish[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]
Copyright © 2001 SSH Communications Security Corp |