SSH With Public Key Authentication

From Teltonika Networks Wiki
Revision as of 07:50, 9 June 2020 by Dziugas (talk | contribs) (Created page with "Typically an SSH login involves specifying a user name, IP address or hostname and the password for the user. When you login to a certain IP address/hostname, the system gener...")

(diff) ← Older revision | Approved revision (diff) | Latest revision (diff) | Newer revision → (diff)
Main Page > FAQ > Control & Configuration > SSH With Public Key Authentication

Typically an SSH login involves specifying a user name, IP address or hostname and the password for the user. When you login to a certain IP address/hostname, the system generates a public/private RSA key pair between the two parties. There is a possibility to login to via SSH using only that type of key with the help of the dropbear service, thus, eliminating the password step.

The process of doing so is different for different operating systems. Below are links to our guides on how to achieve an RSA key SSH login for Linux and Windows systems: