Your browser does not allow storing cookies. We recommend enabling them.


Using Public-Key Authentication

In public-key authentication, the server authenticates the user by the presence of the user's public key in the user's $HOME/.ssh2 directory on the server. The public key ties the user ID to the user's private key stored on the client.

Keys can be generated using the ssh-keygen-g3 tool (ssh-keygen-g3(1)), and they can be distributed to the remote hosts using the ssh-keydist-g3 tool (ssh-keydist-g3(1)).

For more information and examples on public-key authentication, see User Authentication with Public Keys in a File.




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now