Search This Blog

Thursday, April 4, 2019

There are two approaches we can use to authenticate an SSH connection: username and password, or an SSH key pair.

There are two approaches we can use to authenticate an SSH connection: username and password, or an SSH key pair.

- MS

There are two parts to an SSH key pair: a public key and a private key.
  • The public key is placed on your Linux VM or any other service that you wish to use with public-key cryptography. This can be shared with anyone.
  • The private key is what you present to verify your identity to your Linux VM when you make an SSH connection. Consider this confidential information and protect this like you would a password or any other private data.

You can use the same single public-private key pair to access multiple Azure VMs and services.


No comments:

Post a Comment