IT Knowledge Base

Technical Repository

HowTo: Linux – Configure SSH-Key Based Authentication

Let’s assume that you have two servers, ServerA and ServerB. You want to be able to be able to use certificates to log onto ServerB from ServerA without having to type in a username and password. To do this, we need to generate a public and private key pair on ServerA and then copy ServerA’s […]

Read More