RHEL 8: SSH Key - based Authentication and VNC Remote Desktop Access
1. SSH Key - based Authentication
Remote access to a RHEL 8 system demands high - level security. By default, RHEL 8 allows SSH access with password - based authentication, which is vulnerable to password guessing or discovery. Key - based authentication is a better alternative. It uses public key encryption with public and private keys. Only clients with a private key matching a public key on the server can connect. The private key can also be encrypted and password - protected.
1.1 Using Existing Keys with PuTTY
- Select the Private Key : Click the “Browse” button next to the “Private key for authentication” field in PuTTY. Navigate to and select
超级会员免费看
订阅专栏 解锁全文
5万+

被折叠的 条评论
为什么被折叠?



