AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
University of cincinnati ssh for mac4/8/2023 ![]() ![]() In order to use SSH keys to connect to a remote computer, one must first create an SSH key pair on one's computer, then copy the public SSH key to the remote computer. The private key should never be shared with anyone and should be kept safe. ![]() The public key, as the name suggests, is public and can be safely shared with the world. The University ISO will quarantine any host allowing SSH access that has not disabled password authentication.Īn SSH key pair consists of two keys: One public key and one private key. From UT VPN, UT wireless, or CS networkįor instructions on adding SSH keys for other platforms, visit this FAQ.Īs of April 12, 2019, SSH keys are required when SSHing to CS/CSRES networks when outside of our networks, campus wireless, or the VPN.
0 Comments
Read More
Leave a Reply. |