Virtual Machines


Virtual Machines

Documentation > Products > Virtual Machines > SSH Creation and Login

SSH Creation and Login

For Linux host, the SSH service encrypts all transmitted data, providing greater security than traditional telnet services. The SSH automatic login based on key pair authentication can simplify the login process and reduce the operation and maintenance cost while guaranteeing security. This article mainly explains the user's own configuration method. JD Cloud also provides the key pair injection port in the console. Please refer to the key pair.

Key Pair Configuration for Linux System Virtual Machines During the preparation phase, the user needs to log in to the Virtual Machines to edit the configuration file of the Virtual Machines. The process is "create a key pair" - "send the public key into the authentication file" - "configure the key pair login file" - "restart key pair service". The commands are as follows:

yum install lrzsz/ Install upload and download tool

ssh-keygen -t dsa -f ~/.ssh/JD/ JD is key pair name that is customizable

Enter passphrase (empty for no passphrase):/ Enter the password, or directly press Enter without setting the password.

Enter same passphrase again:

cd ~/.ssh

ls –l

cat [1jeemaa1][1jeemaa1]authorized_keys/ Output the contents of the public key to the corresponding file

chmod 400 authorized_keys/ Set file attribute into read-only

sz JD/ Download the private key to the default download directory

sz Download the public key to the default download directory

rm –f ~/.ssh/ Delete the original public key file

rm –f ~/.ssh/JD/ Delete the original private key file

cd /etc/ssh

cp sshd_config sshd_configback/ Back up the ssh configuration file

vi sshd_config/ Edit ssh configuration file

PubkeyAuthentication yes/ Open key pair authentication

AuthorizedKeysfile .ssh/authorized_keys/ PublicKey file path

PasswordAuthentication no/ Turn off password authentication (optional)

#service sshd restart/ Restart sshd service

User Login

  1. SecureCRT login as an example for Windows users. The operation is as follows:

  1. Linux users can log in directly through the command. The operation is as follows:

ssh [–i path][-p port][user@hostname]

For example:

ssh -i /path/to/JD –p 22 root@

More information Secure Shell: Introduction and discussion on SSH on Wikipedia.

OpenSSH Manual Pages: OpenSSH official manual.

RSA: Introduction to the RSA algorithm on Wikipedia.

DSA: Introduction to the DSA algorithm on Wikipedia.

Update Time:2019-08-28 21:38:32