SSH With Public Key Authentication

From Wiki Knowledge Base | Teltonika Networks
This is the approved revision of this page, as well as being the most recent.
Main Page > FAQ > Control & Configuration > SSH With Public Key Authentication

Typically an SSH login involves specifying a user name, IP address or hostname and the password for the user. When you login to a certain IP address/hostname, the system generates a public/private RSA key pair between the two parties. There is a possibility to login to via SSH using only that type of key with the help of the dropbear service, thus, eliminating the password step.

The process of doing so is different for different operating systems. Below are links to our guides on how to achieve an RSA key SSH login for Linux and Windows systems: