{"id":6928,"date":"2024-11-12T14:24:52","date_gmt":"2024-11-12T19:24:52","guid":{"rendered":"https:\/\/carleton.ca\/scs\/?p=6928"},"modified":"2024-11-12T14:24:52","modified_gmt":"2024-11-12T19:24:52","slug":"passwordless-ssh-with-key-pairs","status":"publish","type":"post","link":"https:\/\/carleton.ca\/scs\/2024\/passwordless-ssh-with-key-pairs\/","title":{"rendered":"Passwordless SSH With Key Pairs"},"content":{"rendered":"<p><a href=\"#what\">What is an SSH Key Pair?<\/a><br \/>\n<a href=\"#why\">Why use Key Pairs?<\/a><br \/>\n<a href=\"#compare\">Comparing Password vs Key Pair Authentication<\/a><br \/>\n<a href=\"#creating\">Creating Key Pairs<\/a><br \/>\n<a href=\"#connecting\">Authenticating and Connecting with Key Pairs<\/a><br \/>\n<a href=\"#config\">Advanced Topic: Configuring SSH<\/a><\/p>\n<p>SSH allows you to securely connect to remote computers and virtual machines. With SSH, you can use a computer remotely through the terminal, transfer files between the server and client, and even run graphical programs using X11 forwarding. By default, you will connect to SSH servers using the username and password associated with your account on the server; however, you can <em>also<\/em> set up something called an <strong>SSH Key Pair<\/strong>, which allows you to connect easily and securely.<\/p>\n<h2 id=\"what\">What is an SSH Key Pair?<\/h2>\n<p>As the name suggests, a key pair consists of two keys: the <strong>public key<\/strong> and the <strong>private key<\/strong>. While you can connect to SSH servers using your account username and password, you can also connect using a username and an authorized key pair associated with that username.<\/p>\n<p>Your <strong>public key<\/strong> acts like a personalized padlock that resides on <strong>servers<\/strong>. It is an encrypted file that you can publicly distribute to different servers. When you associate a public key to your account, you are saying that anyone who can unlock the public key can <em>also<\/em> unlock my account without the need for my account password.<\/p>\n<p>Your <strong>private key<\/strong> is the key that unlocks your public key and is kept on the <strong>client<\/strong>. As the name suggests, this is a file that should be private to you and only you. While many private keys do not have file extensions, you may see private keys with the <strong>.pem<\/strong> file extension when using cloud services.<\/p>\n<p>To protect your private key, you always add a <strong>passphrase<\/strong> &#8211; a password to protect your private key. <em>If you are using a key for automated purposes on a secured network, then you may need to create a key that does NOT have a passphrase.  But this is only in specific circumstances.  Any key used for remote access from public networks should always have a passphrase.<\/em><\/p>\n<h2 id=\"why\">Why use Key Pairs?<\/h2>\n<p>Key pairs offer a number of conveniences when you use remote services:<\/p>\n<ul>\n<li>Provides a way of authenticating that is less vulnerable to password guessing and brute force attacks<\/li>\n<li>Distribute your public key to get system access without ever setting up passwords<\/li>\n<li>Have a different key pair for each device and simply delete the public key from the server to revoke the old devices&#8217; access<\/li>\n<li>Create a key pair (without a passphrase) for <strong>scripts<\/strong> or tools like <strong>MPI<\/strong>, <strong>Hadoop<\/strong>, etc. so that they can authenticate with other devices without a password prompt<br \/>\nYou can find a detailed example of setting up ssh key login for scripts in this article:<br \/>\n<a href=\"https:\/\/carleton.ca\/scs\/2021\/using-ssh-keys-to-support-multi-node-compute-tools\/\">Using SSH Keys to Support Multi-node Compute Tools &amp; Scripts<\/a><\/li>\n<\/ul>\n<p>Remember that your public key is truly <strong>public<\/strong>; as long as you protect your private key file, you may distribute your public key however you would like. Nobody can do anything malicious with your public key file, so you can use them to create a shared identity across multiple services. The same public key will work across the different services as long as you use the same private key.<\/p>\n<h2 id=\"compare\">Comparing Password vs Key Pair Authentication<\/h2>\n<p>Below we show comparisons between the password and key pair authentication mechanisms.<br \/>\n<em><span style=\"color: #ff0000;\"><strong>NOTE:<\/strong><\/span> These are grossly over-simplified diagrams of how the various technologies work. It is meant to just provide an general idea of the steps involved and what is happening.<\/em><\/p>\n<div class=\"slideme\"><dl class=\"slideme__list\"><dt class=\"slideme__term\"><a href=\"#slideme-password-authentication\" aria-expanded=\"false\" aria-controls=\"slideme-password-authentication\" class=\"slideme__heading slideme__trigger\">Password Authentication<\/a><\/dt><dd class=\"slideme__description\" id=\"slideme-password-authentication\" aria-hidden=\"true\"><p><br \/>\n<img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-11330\" src=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/password-authentication.png\" alt=\"\" width=\"1652\" height=\"752\" srcset=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/password-authentication.png 1652w, https:\/\/carleton.ca\/scs\/wp-content\/uploads\/password-authentication-240x109.png 240w, https:\/\/carleton.ca\/scs\/wp-content\/uploads\/password-authentication-400x182.png 400w, https:\/\/carleton.ca\/scs\/wp-content\/uploads\/password-authentication-160x73.png 160w, https:\/\/carleton.ca\/scs\/wp-content\/uploads\/password-authentication-768x350.png 768w, https:\/\/carleton.ca\/scs\/wp-content\/uploads\/password-authentication-1536x699.png 1536w, https:\/\/carleton.ca\/scs\/wp-content\/uploads\/password-authentication-360x164.png 360w\" sizes=\"(max-width: 1652px) 100vw, 1652px\" \/><br \/>\n<strong>Advantages of Password Authentication<\/strong><\/p>\n<ul>\n<li>Simple and intuitive to understand<\/li>\n<\/ul>\n<p><strong>Disadvantages of Password Authentication<\/strong><\/p>\n<ul>\n<li>Sharing of the initial account password has to be done via some other medium, such as email, which can be vulnerable<\/li>\n<li>Passwords are often short, making them vulnerable to brute force attacks<\/li>\n<li>Even longer passwords can be vulnerable to password guessing<\/li>\n<li>Running tools or scripts that require remote authentication may require the password to be stored somewhere in <em>plain text<\/em><\/li>\n<li>If a server with your account and password on it is compromised, then any other server using that password could also be at risk. You would have to change the password on all the affected systems<\/li>\n<\/ul>\n<p><\/p><\/dd><dl><\/div>\n<div class=\"slideme\"><dl class=\"slideme__list\"><dt class=\"slideme__term\"><a href=\"#slideme-basic-public-private-key-authentication\" aria-expanded=\"false\" aria-controls=\"slideme-basic-public-private-key-authentication\" class=\"slideme__heading slideme__trigger\">Basic Public-Private Key Authentication<\/a><\/dt><dd class=\"slideme__description\" id=\"slideme-basic-public-private-key-authentication\" aria-hidden=\"true\"><p><br \/>\n<img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-11331\" src=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/public-private-keys-basic.png\" alt=\"\" width=\"1652\" height=\"1279\" srcset=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/public-private-keys-basic.png 1652w, https:\/\/carleton.ca\/scs\/wp-content\/uploads\/public-private-keys-basic-240x186.png 240w, https:\/\/carleton.ca\/scs\/wp-content\/uploads\/public-private-keys-basic-400x310.png 400w, https:\/\/carleton.ca\/scs\/wp-content\/uploads\/public-private-keys-basic-160x124.png 160w, https:\/\/carleton.ca\/scs\/wp-content\/uploads\/public-private-keys-basic-768x595.png 768w, https:\/\/carleton.ca\/scs\/wp-content\/uploads\/public-private-keys-basic-1536x1189.png 1536w, https:\/\/carleton.ca\/scs\/wp-content\/uploads\/public-private-keys-basic-360x279.png 360w\" sizes=\"(max-width: 1652px) 100vw, 1652px\" \/><br \/>\n<strong>Advantages of Basic Public-Private Key Authentication<\/strong><\/p>\n<ul>\n<li>Sharing of an initial account password is not needed, just send your <strong>public key<\/strong><\/li>\n<li>Strong public-private keys are virtually impossible to crack<\/li>\n<li>Can be used to run tools or scripts that require remote authentication<\/li>\n<li>If a server with your <strong>public key<\/strong> on it is compromised, there is no risk of someone using that to <em>guess<\/em> your <strong>private key<\/strong><\/li>\n<\/ul>\n<p><strong>Disadvantages of Basic Public-Private Key Authentication<\/strong><\/p>\n<ul>\n<li>If someone gets your <strong>private key<\/strong>, they can use it to access ANY system that uses your <strong>public key<\/strong>. You would need to remove your <strong>public key<\/strong> from all of those affected systems<\/li>\n<\/ul>\n<p><\/p><\/dd><dl><\/div>\n<div class=\"slideme\"><dl class=\"slideme__list\"><dt class=\"slideme__term\"><a href=\"#slideme-passphrase-protected-public-private-key-authentication\" aria-expanded=\"false\" aria-controls=\"slideme-passphrase-protected-public-private-key-authentication\" class=\"slideme__heading slideme__trigger\">Passphrase Protected Public-Private Key Authentication<\/a><\/dt><dd class=\"slideme__description\" id=\"slideme-passphrase-protected-public-private-key-authentication\" aria-hidden=\"true\"><p><br \/>\n<img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-11333\" src=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/public-private-keys-with-passphrase.png\" alt=\"\" width=\"1652\" height=\"1766\" srcset=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/public-private-keys-with-passphrase.png 1652w, https:\/\/carleton.ca\/scs\/wp-content\/uploads\/public-private-keys-with-passphrase-240x257.png 240w, https:\/\/carleton.ca\/scs\/wp-content\/uploads\/public-private-keys-with-passphrase-400x428.png 400w, https:\/\/carleton.ca\/scs\/wp-content\/uploads\/public-private-keys-with-passphrase-160x171.png 160w, https:\/\/carleton.ca\/scs\/wp-content\/uploads\/public-private-keys-with-passphrase-768x821.png 768w, https:\/\/carleton.ca\/scs\/wp-content\/uploads\/public-private-keys-with-passphrase-1437x1536.png 1437w, https:\/\/carleton.ca\/scs\/wp-content\/uploads\/public-private-keys-with-passphrase-360x385.png 360w\" sizes=\"(max-width: 1652px) 100vw, 1652px\" \/><br \/>\n<strong>Advantages of Passphrase Protected Public-Private Key Authentication<\/strong><\/p>\n<ul>\n<li>Sharing of an initial account password is not needed, just send your <strong>public key<\/strong><\/li>\n<li>Strong public-private keys are virtually impossible to crack<\/li>\n<li>If someone gets your <strong>private key<\/strong>, they cannot use it unless they can guess your passphrase.<br \/>\n<em>It is still recommended that you remove your public key from any servers that are using it, as there is always a risk that they may eventually guess your passphrase<\/em><\/li>\n<li>If a server with your <strong>public key<\/strong> on it is compromised, there is no risk of someone using that to <em>guess<\/em> your private key<\/li>\n<\/ul>\n<p><strong>Disadvantages of Passphrase Protected Public-Private Key Authentication<\/strong><\/p>\n<ul>\n<li>Can not easily be used to run tools or scripts that require remote authentication as there may not be a way to automate entering the passphrase<\/li>\n<\/ul>\n<p><\/p><\/dd><dl><\/div>\n<h2 id=\"creating\">Creating Key Pairs<\/h2>\n<p>Most operating systems support a tool called <strong>ssh-keygen<\/strong> that allows you to create a public\/private key pair.<\/p>\n<h3>Linux \/ Apple OSX \/ Windows 10<\/h3>\n<ol>\n<li>Open a <strong>Terminal<\/strong> window \/ prompt<br \/>\n<em>On Windows, you can open a <strong>Command Prompt<\/strong> or <strong>PowerShell<\/strong><\/em><br \/>\n<em>See <a title=\"Enable OpenSSH on Windows 10\" href=\"https:\/\/carleton.ca\/scs\/2021\/enable-openssh-on-windows-10\/\">Enable OpenSSH on Windows 10<\/a> if <code>ssh-keygen<\/code> is not enabled on Windows 10 (older versions do not have it enabled by default)<\/em><\/li>\n<li>Enter the <code>ssh-keygen -t ed25519<\/code> command to open up an interactive prompt that takes you through the steps of creating an SSH key<\/li>\n<li>Type a filename for the key, or use the default\n<ul>\n<li>If you are only using one SSH key pair, you can keep the default <em>(usually <code>~\/.ssh\/id_ed25519<\/code>)<\/em><\/li>\n<li>If you are creating multiple key pairs for different purposes, you should name it something meaningful (e.g. <code>~\/.ssh\/home_github_key<\/code>)<\/li>\n<\/ul>\n<\/li>\n<li>Finally, type your passphrase. <strong><em>You should ALWAYS use a passphrase<\/em><\/strong><br \/>\n<em>If your key has a passphrase, then if someone somehow gets your private key file, they will still not be able to use it unless they are able to guess your passphrase. In some cases, such as setting up server\/application automation (hadoop, MPI, etc), you may want to create a key without a passphrase.  But this should <strong>NEVER<\/strong> be done for a key used to remote access a system, repository, etc from public networks<\/em><\/p>\n<ul>\n<li><strong>NOTE:<\/strong> When typing passwords in the terminal, no text will appear while you type &#8212; press Enter to continue<\/li>\n<\/ul>\n<\/li>\n<li>Your <strong>public and private key pair <\/strong>should now be available in <code>~\/.ssh\/<\/code> or wherever you specified.<\/li>\n<\/ol>\n<h2 id=\"connecting\">Authenticating and Connecting with Key Pairs<\/h2>\n<h3>Linux \/ Apple OSX \/ Windows 10<\/h3>\n<h4>Authorize your key pair on a remote server<\/h4>\n<p>Once you have created your key pair, you need to authorize the key pair to unlock your account.<\/p>\n<ul>\n<li>Copy your identity (<strong>public<\/strong> key) over to the remote server using the <code>ssh-copy-id<\/code> command:<br \/>\n<code>ssh-copy-id &#x75;&#x73;&#101;&#114;&#110;a&#x6d;&#x65;&#x40;&#114;&#101;mo&#x74;&#x65;&#x73;&#101;&#114;v&#x65;&#x72;&#x6e;&#97;&#109;&#101;&#46;&#x63;&#x61;<\/code> <em> &#8211; substituting your particular username and remote server name (or IP address)<\/em><\/li>\n<li><strong>NOTE: <\/strong>If you created a specific ssh key file (rather than using the default), you can specify it with the <code>-i<\/code> option:<br \/>\n<code>ssh-copy-id -i <em>&lt;PUBLIC KEY FILE&gt;<\/em> &#x75;&#x73;&#x65;&#x72;&#110;&#97;me&#64;&#x72;&#x65;&#x6d;&#x6f;&#116;&#101;ser&#x76;&#x65;&#x72;&#x6e;&#97;&#109;&#101;&#46;c&#x61;<\/code> <em>&#8211; giving your <strong>public<\/strong> key file<\/em><\/li>\n<\/ul>\n<h4>Connect to the remote server using the key pair<\/h4>\n<p>Once you have authorized the key pair you can connect with it.<\/p>\n<ul>\n<li>Connect using your default ssh key using the <code>ssh<\/code> command:<br \/>\n<code>ssh &#x75;&#x73;&#x65;&#x72;&#x6e;&#x61;&#x6d;&#x65;&#64;&#114;&#101;&#109;&#111;&#116;&#101;serv&#x65;&#x72;&#x6e;&#x61;&#x6d;&#x65;&#x2e;&#x63;&#x61;<\/code><em> &#8211; substituting your particular username and remote server name (or IP address)<\/em><\/li>\n<li><strong>NOTE: <\/strong>If you created a specific ssh key file (rather than using the default), you can specify it with the <code>-i<\/code> option:<br \/>\n<code>ssh -i <em>&lt;PRIVATE KEY FILE&gt;<\/em> &#117;&#x73;&#101;&#x72;&#110;&#x61;&#109;&#x65;&#64;&#x72;&#101;&#x6d;o&#x74;e&#x73;e&#x72;v&#x65;r&#x6e;a&#109;&#x65;&#46;&#x63;&#97;<\/code> <em>&#8211; This time specifying your <strong>private<\/strong> key file<\/em><\/li>\n<\/ul>\n<p><strong>For information about connecting with PuTTY,<\/strong> visit the <a href=\"https:\/\/carleton.ca\/scs\/2019\/connecting-to-openstack-instances-ssh-with-putty\/\">Connecting to OpenStack with SSH and PuTTY<\/a> quick-start guide.<\/p>\n<h2 id=\"config\">Advanced Topic: Configuring SSH<\/h2>\n<p>Once you start using SSH for many different services and making use of multiple key pair identities, it may be useful to start using an SSH configuration file.<\/p>\n<p>SSH configs enable:<\/p>\n<ul>\n<li>Giving servers simpler aliases, e.g. typing ssh openstack rather than ssh 134.117.x.x<\/li>\n<li>Using different identities with different servers without needing to specify each time<\/li>\n<li>Forward ports with SSH to access remote services, such as forwarding a Jupyter Notebook server from a remote port to a local port<\/li>\n<\/ul>\n<p>There is a lot of information available online about setting up ssh configurations for different purposes. Your ssh configuration is typically in your home ssh folder, such as\u00a0<em>~\/.ssh<\/em> on Linux or <em>%USERPROFILE%\/.ssh\/<\/em> on Windows, with OpenSSH installed. If there isn&#8217;t a file called <em>config<\/em> you can make one. Below is a sample SSH configuration to have one passwordless private key for Github and another passworded key for OpenStack, with parts that need to be switched for individual use.<\/p>\n<div class=\"slideme\"><dl class=\"slideme__list\"><dt class=\"slideme__term\"><a href=\"#slideme-example-ssh-configuration\" aria-expanded=\"false\" aria-controls=\"slideme-example-ssh-configuration\" class=\"slideme__heading slideme__trigger\">Example SSH Configuration<\/a><\/dt><dd class=\"slideme__description\" id=\"slideme-example-ssh-configuration\" aria-hidden=\"true\"><p><\/p>\n<pre>Host openstack\r\n\u00a0\u00a0User username\r\n\u00a0\u00a0HostName 134.117.x.x\r\n\u00a0\u00a0IdentityFile ~\/.ssh\/openstack.pem\r\nHost github.com\r\n\u00a0\u00a0IdentityFile ~\/.ssh\/passwordless.git.pem<\/pre>\n<p><\/p><\/dd><dl><\/div>\n<p>Using the above file, you could then connect to your OpenStack instance using <code>ssh openstack<\/code> rather than <code>ssh -i ~\/.ssh\/openstack.pem username&#64;134&#46;117&#46;x&#46;x<\/code> and <code>git<\/code> will also use the correct identity file when using SSH and working with GitHub.com.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is an SSH Key Pair? Why use Key Pairs? Comparing Password vs Key Pair Authentication Creating Key Pairs Authenticating and Connecting with Key Pairs Advanced Topic: Configuring SSH SSH allows you to securely connect to remote computers and virtual machines. With SSH, you can use a computer remotely through the terminal, transfer files between [&hellip;]<\/p>\n","protected":false},"author":38,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_mi_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[61,58,99],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Passwordless SSH With Key Pairs - School of Computer Science<\/title>\n<meta name=\"description\" content=\"Learn about SSH key pairs, how they enable you to access services such as OpenStack without retyping your password, and how to connect using your key pair.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/carleton.ca\/scs\/2024\/passwordless-ssh-with-key-pairs\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"connorhillen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/carleton.ca\/scs\/2024\/passwordless-ssh-with-key-pairs\/\",\"url\":\"https:\/\/carleton.ca\/scs\/2024\/passwordless-ssh-with-key-pairs\/\",\"name\":\"Passwordless SSH With Key Pairs - School of Computer Science\",\"isPartOf\":{\"@id\":\"https:\/\/carleton.ca\/scs\/#website\"},\"datePublished\":\"2024-11-12T19:24:52+00:00\",\"dateModified\":\"2024-11-12T19:24:52+00:00\",\"author\":{\"@id\":\"https:\/\/carleton.ca\/scs\/#\/schema\/person\/937734836f8bb1ef40a07541e4511157\"},\"description\":\"Learn about SSH key pairs, how they enable you to access services such as OpenStack without retyping your password, and how to connect using your key pair.\",\"breadcrumb\":{\"@id\":\"https:\/\/carleton.ca\/scs\/2024\/passwordless-ssh-with-key-pairs\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/carleton.ca\/scs\/2024\/passwordless-ssh-with-key-pairs\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/carleton.ca\/scs\/2024\/passwordless-ssh-with-key-pairs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/carleton.ca\/scs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Technical Support\",\"item\":\"https:\/\/carleton.ca\/scs\/category\/technicalsupport\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Linux Tech Support\",\"item\":\"https:\/\/carleton.ca\/scs\/category\/technicalsupport\/linux-tech-support\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Passwordless SSH With Key Pairs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/carleton.ca\/scs\/#website\",\"url\":\"https:\/\/carleton.ca\/scs\/\",\"name\":\"School of Computer Science\",\"description\":\"Carleton University\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/carleton.ca\/scs\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/carleton.ca\/scs\/#\/schema\/person\/937734836f8bb1ef40a07541e4511157\",\"name\":\"connorhillen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/carleton.ca\/scs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/37bb5480f77d5bab43767e89bf8a1351?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/37bb5480f77d5bab43767e89bf8a1351?s=96&d=mm&r=g\",\"caption\":\"connorhillen\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Passwordless SSH With Key Pairs - School of Computer Science","description":"Learn about SSH key pairs, how they enable you to access services such as OpenStack without retyping your password, and how to connect using your key pair.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/carleton.ca\/scs\/2024\/passwordless-ssh-with-key-pairs\/","twitter_misc":{"Written by":"connorhillen","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/carleton.ca\/scs\/2024\/passwordless-ssh-with-key-pairs\/","url":"https:\/\/carleton.ca\/scs\/2024\/passwordless-ssh-with-key-pairs\/","name":"Passwordless SSH With Key Pairs - School of Computer Science","isPartOf":{"@id":"https:\/\/carleton.ca\/scs\/#website"},"datePublished":"2024-11-12T19:24:52+00:00","dateModified":"2024-11-12T19:24:52+00:00","author":{"@id":"https:\/\/carleton.ca\/scs\/#\/schema\/person\/937734836f8bb1ef40a07541e4511157"},"description":"Learn about SSH key pairs, how they enable you to access services such as OpenStack without retyping your password, and how to connect using your key pair.","breadcrumb":{"@id":"https:\/\/carleton.ca\/scs\/2024\/passwordless-ssh-with-key-pairs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/carleton.ca\/scs\/2024\/passwordless-ssh-with-key-pairs\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/carleton.ca\/scs\/2024\/passwordless-ssh-with-key-pairs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/carleton.ca\/scs\/"},{"@type":"ListItem","position":2,"name":"Technical Support","item":"https:\/\/carleton.ca\/scs\/category\/technicalsupport\/"},{"@type":"ListItem","position":3,"name":"Linux Tech Support","item":"https:\/\/carleton.ca\/scs\/category\/technicalsupport\/linux-tech-support\/"},{"@type":"ListItem","position":4,"name":"Passwordless SSH With Key Pairs"}]},{"@type":"WebSite","@id":"https:\/\/carleton.ca\/scs\/#website","url":"https:\/\/carleton.ca\/scs\/","name":"School of Computer Science","description":"Carleton University","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/carleton.ca\/scs\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/carleton.ca\/scs\/#\/schema\/person\/937734836f8bb1ef40a07541e4511157","name":"connorhillen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/carleton.ca\/scs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/37bb5480f77d5bab43767e89bf8a1351?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/37bb5480f77d5bab43767e89bf8a1351?s=96&d=mm&r=g","caption":"connorhillen"}}]}},"acf":{"Post Thumbnail Icon":"person-to-person","Post Thumbnail":false},"_links":{"self":[{"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/posts\/6928"}],"collection":[{"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/comments?post=6928"}],"version-history":[{"count":4,"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/posts\/6928\/revisions"}],"predecessor-version":[{"id":8527,"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/posts\/6928\/revisions\/8527"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/media?parent=6928"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/categories?post=6928"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/tags?post=6928"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}