How to Set up SSH keys?

How to Set up SSH keys?

Secure Shell, most commonly known as SSH, is a common network protocol that enables users to securely access a computer/server over an unsecured network. SSH keys gives added security to SSH in the sense that a password need not be used when making use of SSH keys.

SSH key pair comprises of both a public key and private key, both of which are a long string of characters. The public key is saved in the server to which SSH connection is to be done and the private key is stored on the system/computer from which SSH connection is requested.

The below steps can be followed to set up SSH Key based authentication.

1. Create SSH Key pair

On the computer from which SSH connection is requested, make use of the below command to generate a key pair

ssh-keygen -t rsa

A sample output of this command will be as below:

ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/home/user/.ssh/id_rsa):
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/user/.ssh/id_rsa.
Your public key has been saved in /home/user/.ssh/id_rsa.pub.
The key fingerprint is:
SHA256:q5CKez4qSUCNiNbuNfy8B+3+XtCc9b/WYMp9WX6k7kw user@DESKTOP-8UVUO7D
The key’s randomart image is:
+—[RSA 2048]—-+
|o + |
|o+ o |
|o . . . |
|. . + o o .|
|. . . + S . + .|
| . . . + o . o +|
|.. o = . =E==|
|o.o. . o o +ooo*|

|==o. . o.oo o=o.|
+—-[SHA256]—–+

You may give a passphrase (password) at the time of key pair generation when prompted to. The passphrase adds extra security for the SSH key pair.

Once the command has been executed, the public key will be stored accordingly as id_rsa.pub and the private key as id_rsa in the path that has been specified at the time of key pair generation.

2. Copy the public key to the remote server

The public id_rsa.pub key then needs to be copied to the server to which the SSH connection is to be made. For this, there are two available options.

  • Use the ssh-copy-id command as below, where user is the username with which you are connecting to the server with IP address 123.123.123.123

ssh-copy-id [email protected]

  • You can alternatively copy the public key to the authorized_keys file located inside the .ssh folder in your server 123.123.123.123.

3. Test the SSH connection.

Once the public key has been added to the server, you can test the SSH connection to the server from the computer which has the private key, using the below command.

ssh [email protected]

There will not be any prompt for the password. However, you may be prompted to enter the passphrase, if it had been set at the time of SSH key pair generation.

4. Disable SSH direct root login

Once you have confirmed that the server is accessible using SSH key pair, you can proceed to disable direct root login to your server through SSH. For this, the below steps can be followed.

  • Open the SSH configuration file /etc/ssh/sshd_config
  • Change the value of PermitRootLogin to no
  • Restart SSH service using the below command

service sshd restart

GET STARTED WITH OUR HOSTING SUPPORT SERVICES

Rohith Krishnan

Rohith SK is an MSC computer science graduate living in Cochin, Kerala. As a technology enthusiast, he is always on the lookout for the latest trends and developments in the field, with a particular interest in cloud computing and DevOps updates. Apart from his passion for technology, Rohith SK is an avid reader and enjoys spending his free time exploring different genres of literature. He believes that reading is one of the best ways to expand one's knowledge and understanding of the world. With his expertise in computer science and a passion for technology, Rohith SK regularly contributes articles and blog posts on the latest trends and updates in the industry. His articles offer insights and valuable perspectives on the various aspects of cloud computing and DevOps, and are widely read and appreciated by readers all over the world. As an experienced technology writer and researcher, Rohith SK's articles are well-researched, informative, and easy to understand, making them accessible to readers of all levels of technical knowledge. Whether you're a beginner looking to learn more about the latest trends in technology, or an experienced professional seeking insights and updates, Rohith's articles are sure to provide valuable information and insights.

Leave a Reply