First page Back Continue Last page Overview Graphics
The SSH approach - part 2
Use public key cryptography to prove user identity.
- Generate a public/private key pair.
- Install the private key locally and the public key on the remote host.
- Connect from local host to remote, no password required, it has been replaced by something vastly stronger.
- Still a good idea to protect the private a key with a password, but that password never has to touch the network, never has to be stored in any form on a remote system and is not subject to the whims of policy on the remote system.