Editing SSH:Authorized Keys
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 75: | Line 75: | ||
<h3>authorized_keys: restricting access</h3> | <h3>authorized_keys: restricting access</h3> | ||
What we have described above allows any remote host where the private key is known to make any kind of ssh connection (login, remote command execution, port forwarding, etc.) to the computer on which the <code>authorized_keys | What we have described above allows any remote host where the private key is known to make any kind of ssh connection (login, remote command execution, port forwarding, etc.) to the computer on which the <code>authorized_keys. There are a number of things that can be done in an authorized_keys to further restrict access.Β These are all arranged by prefixing the line containing the public key by a single "phrase" of comma-separated options (see below for an example of what this winds up looking like) | ||
<h4>Host access list</h4> | <h4>Host access list</h4> |