Available 24 hours per day, excluding a few campus holidays. If you chose to protect your private key with a passphrase in step 2, you will be prompted to enter the passphrase when connecting.24/7 Support Center: For Technology Support, including personal computers and all campus-wide technologies like UAWiFi, VPN, CatMail, UAccess, etc., as well as general questions about the University of Arizona.
Documents\SSH_Keys\mylaptop_private_key.openssh to be used later for Thinlinc.Ĭonfigure PuTTY to use key-based authentication:
The PuTTY Key Generator form has inputs for the Key passphrase and optional reminder comment.įrom the menu of PuTTYgen, use the "Conversion -> Export OpenSSH key" tool to convert the private key into openssh format, e.g. Note: If you do not protect your private key with a passphrase, anyone with access to your computer could SSH to your account on Brown. When saving the private key, you can also choose a reminder comment, as well as an optional passphrase to protect your key, as shown in the image below. Documents\SSH_Keys\mylaptop_private_key.ppk. Use the Save private key button to save the private key, e.g. Documents\SSH_Keys\mylaptop_public_key.pub Use the Save public key button to save the public key, e.g. The "Generate" button can be found under the "Actions" section of the PuTTY Key Generator interface. Launch PuTTYgen, keep the default key type (RSA) and length (2048-bits) and click Generate button. Open a local terminal and follow Linux steps
Ssh -i my_private_key_name to section 'Windows:' of 'SSH Keys' Windows: Windows SSH Instructions Programs If the private key has a non-default name or location, you need to specify the key by The login should now complete without asking for a password. Test the new key by SSH-ing to the server. Ssh-copy-id -i ~/.ssh/id_rsa.pub your system does not have the ssh-copy-id command, use this instead:Ĭat ~/.ssh/id_rsa.pub | ssh "mkdir -p ~/.ssh & chmod 700 ~/.ssh & cat > ~/.ssh/authorized_keys" Please see 2FA deployment schedule for each cluster!
Note: use Boilerkey 2FA when asked for a password after 2FA deployment. Note: If you do not protect your private key with a passphrase, anyone with access to your computer could SSH to your account on Brown.īy default, the key files will be stored in ~/.ssh/id_rsa and ~/.ssh/id_rsa.pub on your local machine.Ĭopy the contents of the public key into $HOME/.ssh/authorized_keys on the cluster with the following command. To accept the default settings, press Enter without specifying a filename. You may supply a filename and a passphrase for protecting your private key, but it is not mandatory. Run ssh-keygen in a terminal on your local machine. Link to section 'Mac and Linux:' of 'SSH Keys' Mac and Linux: