創建SSH信任
將A主機作爲客戶端(發起SSH請求 ip:192.168.0.25)
將B主機做爲服務器端(接收ssh請求 ip:192.168.0.23)
以上以主動發起SSH登陸請求的主機和接收請求的主機進行分類
<1>A主機生成公,私鑰證書
[root@locala .ssh]# ssh-keygen -t rsa #rsa算法的證書
Generating public/private rsa key pair. (如下一路回車)
Enter file in which to save the key (/root/.ssh/id_rsa):
/root/.ssh/id_rsa already exists.
Overwrite (y/n)? y (由於個人證書已存在,覆蓋便可)
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /root/.ssh/id_rsa. (私鑰)
Your public key has been saved in /root/.ssh/id_rsa.pub. (公鑰)
The key fingerprint is:
fc:c1:c4:d5:d1:e8:18:ad:fe:7d:30:17:00:32:99:8d.算法
證書就生成了 id_rsa (私鑰)|& id_rsa.pub (公鑰)
<2>將A主機生成的公鑰傳遞給B主機
[root@locala .ssh]#scp id_rsa.pub 192.168.0.23:/root/.ssh/
在B主機上將A的公鑰改名爲
[root@localb .ssh]#mv id_rsa.pub authorized_keys
<3>至此從A主機遠程SSH B主機的工做即告完成服務器
[root@locala .ssh]#ssh user@192.168.0.23ssh
若是無需輸入密碼,則表示配置免登陸成功。 ide
* 若是仍須要輸入密碼,則多是.ssh目錄和文件權限須要修改。
spa