SlideShare a Scribd company logo
1 of 2
Download to read offline
Many times when we login to a system, we use a username/password combination.
For example, to login to the DTCC portal, you enter a username/password combination into a web
form like what is displayed below
Another option for authentication, and one that is used by cloud computing infrastructure
environments such as AWS is to use a cryptographic key and pass the key to the server during
login.
In this lab, youll generate a cryptographic key to enable passwordless login to your Ubuntu VM.
Step 1:
Generate the keypair. On either your Windows10 VM or your Ubuntu VM, run the command: ssh-
keygen You should see output similar to the following:
Two files were created as a result of running this command:
The file id_rsa is readable ONLY by the owner because it is the RSA Private key. This file should
be guarded and treated as a password.
The other file, id_rsa.pub is the RSA public key associated with the private key file.
Step 2:
To enable login to your Ubuntu VM using the certificate (and without entering a password) copy
the id_rsa.pub file into your home directory in a file named .ssh/authorized_keys.
Step 3:
Login to your Ubuntu VM from your Windows 10 VM using the ssh command in a command
window. You will need to supply the -i option and include the name and location of your RSA
private key that you generated in step 1
Instructions
Many times when we login to a system, we use a username/password combination.
For example, to login to the DTCC portal, you enter a username/password combination into a
web form like what is displayed below
Another option for authentication, and one that is used by cloud computing infrastructure
environments such as AWS is to use a cryptographic key and pass the key to the server during
login.
In this lab, youll generate a cryptographic key to enable passwordless login to your Ubuntu VM.
Step 1:
Generate the keypair. On either your Windows10 VM or your Ubuntu VM, run the command: ssh-
keygen You should see output similar to the following:
Two files were created as a result of running this command:
The file id_rsa is readable ONLY by the owner because it is the RSA Private key. This file should
be guarded and treated as a password.
The other file, id_rsa.pub is the RSA public key associated with the private key file.
Step 2:
To enable login to your Ubuntu VM using the certificate (and without entering a password) copy
the id_rsa.pub file into your home directory in a file named .ssh/authorized_keys.
Step 3:
Login to your Ubuntu VM from your Windows 10 VM using the ssh command in a command
window. You will need to supply the -i option and include the name and location of your RSA
private key that you generated in step 1

More Related Content

Similar to Many times when we login to a system we use a usernamepass.pdf

Install websphere message broker 8 RHEL 6 64 bits
Install websphere message broker 8 RHEL 6 64 bitsInstall websphere message broker 8 RHEL 6 64 bits
Install websphere message broker 8 RHEL 6 64 bitsManuel Vega
 
A Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsA Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsJohn Rhoton
 
AWS Summit Benelux 2013 - Getting Started with AWS
AWS Summit Benelux 2013 - Getting Started with AWSAWS Summit Benelux 2013 - Getting Started with AWS
AWS Summit Benelux 2013 - Getting Started with AWSAmazon Web Services
 
An introduction to SSH
An introduction to SSHAn introduction to SSH
An introduction to SSHnussbauml
 
Cyber security and ethical hacking 9
Cyber security and ethical hacking 9Cyber security and ethical hacking 9
Cyber security and ethical hacking 9Mehedi Hasan
 
How to Install SSL Certificate in Red Hat Linux Apache Web Server
How to Install SSL Certificate in Red Hat Linux Apache Web ServerHow to Install SSL Certificate in Red Hat Linux Apache Web Server
How to Install SSL Certificate in Red Hat Linux Apache Web ServerAboutSSL
 
Securing Windows Remote Desktop With Copssh
Securing Windows Remote Desktop With CopsshSecuring Windows Remote Desktop With Copssh
Securing Windows Remote Desktop With CopsshCrismer La Pignola
 
Module 1 introduction to aws demo 4
Module 1 introduction to aws demo 4Module 1 introduction to aws demo 4
Module 1 introduction to aws demo 4Ganesh Bhosale
 
Samba server installation and File sharing
Samba server installation and File sharingSamba server installation and File sharing
Samba server installation and File sharingEagle Eyes
 
Amazon AWS Workspace Howto
Amazon AWS Workspace HowtoAmazon AWS Workspace Howto
Amazon AWS Workspace Howtomailbhargav
 
Aws overview part 2(compute services)
Aws overview   part 2(compute services)Aws overview   part 2(compute services)
Aws overview part 2(compute services)Parag Patil
 
How To Setup SSH Keys on CentOS 7
How To Setup SSH Keys on CentOS 7How To Setup SSH Keys on CentOS 7
How To Setup SSH Keys on CentOS 7VCP Muthukrishna
 
Securing Network Access with Open Source solutions
Securing Network Access with Open Source solutionsSecuring Network Access with Open Source solutions
Securing Network Access with Open Source solutionsNick Owen
 
Web security programming_ii
Web security programming_iiWeb security programming_ii
Web security programming_iigoogli
 

Similar to Many times when we login to a system we use a usernamepass.pdf (20)

Install websphere message broker 8 RHEL 6 64 bits
Install websphere message broker 8 RHEL 6 64 bitsInstall websphere message broker 8 RHEL 6 64 bits
Install websphere message broker 8 RHEL 6 64 bits
 
A Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsA Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection Solutions
 
AWS Summit Benelux 2013 - Getting Started with AWS
AWS Summit Benelux 2013 - Getting Started with AWSAWS Summit Benelux 2013 - Getting Started with AWS
AWS Summit Benelux 2013 - Getting Started with AWS
 
Windowshadoop
WindowshadoopWindowshadoop
Windowshadoop
 
Mimikatz
MimikatzMimikatz
Mimikatz
 
An introduction to SSH
An introduction to SSHAn introduction to SSH
An introduction to SSH
 
Cyber security and ethical hacking 9
Cyber security and ethical hacking 9Cyber security and ethical hacking 9
Cyber security and ethical hacking 9
 
How to Install SSL Certificate in Red Hat Linux Apache Web Server
How to Install SSL Certificate in Red Hat Linux Apache Web ServerHow to Install SSL Certificate in Red Hat Linux Apache Web Server
How to Install SSL Certificate in Red Hat Linux Apache Web Server
 
Securing Windows Remote Desktop With Copssh
Securing Windows Remote Desktop With CopsshSecuring Windows Remote Desktop With Copssh
Securing Windows Remote Desktop With Copssh
 
Module 1 introduction to aws demo 4
Module 1 introduction to aws demo 4Module 1 introduction to aws demo 4
Module 1 introduction to aws demo 4
 
Rhel5
Rhel5Rhel5
Rhel5
 
Samba server installation and File sharing
Samba server installation and File sharingSamba server installation and File sharing
Samba server installation and File sharing
 
PowerShell Remoting
PowerShell RemotingPowerShell Remoting
PowerShell Remoting
 
Amazon AWS Workspace Howto
Amazon AWS Workspace HowtoAmazon AWS Workspace Howto
Amazon AWS Workspace Howto
 
Aws overview part 2(compute services)
Aws overview   part 2(compute services)Aws overview   part 2(compute services)
Aws overview part 2(compute services)
 
Knowledge article
Knowledge articleKnowledge article
Knowledge article
 
How To Setup SSH Keys on CentOS 7
How To Setup SSH Keys on CentOS 7How To Setup SSH Keys on CentOS 7
How To Setup SSH Keys on CentOS 7
 
Securing Network Access with Open Source solutions
Securing Network Access with Open Source solutionsSecuring Network Access with Open Source solutions
Securing Network Access with Open Source solutions
 
demo1
demo1demo1
demo1
 
Web security programming_ii
Web security programming_iiWeb security programming_ii
Web security programming_ii
 

More from admin447081

Problem 7 The following fraction nonconforming control char.pdf
Problem 7 The following fraction nonconforming control char.pdfProblem 7 The following fraction nonconforming control char.pdf
Problem 7 The following fraction nonconforming control char.pdfadmin447081
 
Donna and Chris Hoser have been married for three years Don.pdf
Donna and Chris Hoser have been married for three years Don.pdfDonna and Chris Hoser have been married for three years Don.pdf
Donna and Chris Hoser have been married for three years Don.pdfadmin447081
 
On January 1 2021 Pembina Corporation a publicly traded c.pdf
On January 1 2021 Pembina Corporation a publicly traded c.pdfOn January 1 2021 Pembina Corporation a publicly traded c.pdf
On January 1 2021 Pembina Corporation a publicly traded c.pdfadmin447081
 
Multinational organisations MNOs operate their activities .pdf
Multinational organisations MNOs operate their activities .pdfMultinational organisations MNOs operate their activities .pdf
Multinational organisations MNOs operate their activities .pdfadmin447081
 
Las hembras de bonobo Pan paniscus pueden ir solas e int.pdf
Las hembras de bonobo Pan paniscus pueden ir solas e int.pdfLas hembras de bonobo Pan paniscus pueden ir solas e int.pdf
Las hembras de bonobo Pan paniscus pueden ir solas e int.pdfadmin447081
 
Hawthorne almalar aadakilerin nemini ortaya kard Birini.pdf
Hawthorne almalar aadakilerin nemini ortaya kard  Birini.pdfHawthorne almalar aadakilerin nemini ortaya kard  Birini.pdf
Hawthorne almalar aadakilerin nemini ortaya kard Birini.pdfadmin447081
 
a 5 points Prove that Y the vector of fitted values is.pdf
a 5 points Prove that Y the vector of fitted values is.pdfa 5 points Prove that Y the vector of fitted values is.pdf
a 5 points Prove that Y the vector of fitted values is.pdfadmin447081
 
6 If X1X2Xn constitute a random sample of size n from a.pdf
6 If X1X2Xn constitute a random sample of size n from a.pdf6 If X1X2Xn constitute a random sample of size n from a.pdf
6 If X1X2Xn constitute a random sample of size n from a.pdfadmin447081
 
1a Cul de los siguientes no es un ejemplo de un accionist.pdf
1a Cul de los siguientes no es un ejemplo de un accionist.pdf1a Cul de los siguientes no es un ejemplo de un accionist.pdf
1a Cul de los siguientes no es un ejemplo de un accionist.pdfadmin447081
 
DEF Company also has preferred stock outstanding that pays a.pdf
DEF Company also has preferred stock outstanding that pays a.pdfDEF Company also has preferred stock outstanding that pays a.pdf
DEF Company also has preferred stock outstanding that pays a.pdfadmin447081
 
4 Explain the usage of each tool that you identified above.pdf
4 Explain the usage of each tool that you identified above.pdf4 Explain the usage of each tool that you identified above.pdf
4 Explain the usage of each tool that you identified above.pdfadmin447081
 
CASO INTEGRATIVO 30 IKEA estilo escandinavo Detrs de l.pdf
CASO INTEGRATIVO 30  IKEA estilo escandinavo  Detrs de l.pdfCASO INTEGRATIVO 30  IKEA estilo escandinavo  Detrs de l.pdf
CASO INTEGRATIVO 30 IKEA estilo escandinavo Detrs de l.pdfadmin447081
 
1 a Cul es el nombre de la esfera que se encuentra en e.pdf
1  a Cul es el nombre de la esfera que se encuentra en e.pdf1  a Cul es el nombre de la esfera que se encuentra en e.pdf
1 a Cul es el nombre de la esfera que se encuentra en e.pdfadmin447081
 
According to US Census data 716 of Americans are age 21.pdf
According to US Census data 716 of Americans are age 21.pdfAccording to US Census data 716 of Americans are age 21.pdf
According to US Census data 716 of Americans are age 21.pdfadmin447081
 
1 Sosyal medya pazarlamasn SMM kullanmann avantajlar ile .pdf
1 Sosyal medya pazarlamasn SMM kullanmann avantajlar ile .pdf1 Sosyal medya pazarlamasn SMM kullanmann avantajlar ile .pdf
1 Sosyal medya pazarlamasn SMM kullanmann avantajlar ile .pdfadmin447081
 
10 points Let continuous variables X1Xk be independentl.pdf
10 points Let continuous variables X1Xk be independentl.pdf10 points Let continuous variables X1Xk be independentl.pdf
10 points Let continuous variables X1Xk be independentl.pdfadmin447081
 
1 Provide three examples of automatic data classifications .pdf
1 Provide three examples of automatic data classifications .pdf1 Provide three examples of automatic data classifications .pdf
1 Provide three examples of automatic data classifications .pdfadmin447081
 
Theodore E Lariat is a single taxpayer born on September 22.pdf
Theodore E Lariat is a single taxpayer born on September 22.pdfTheodore E Lariat is a single taxpayer born on September 22.pdf
Theodore E Lariat is a single taxpayer born on September 22.pdfadmin447081
 
Use C++ for all 1 bool mapContainsKeysarrayltintgt nu.pdf
Use C++ for all  1 bool mapContainsKeysarrayltintgt nu.pdfUse C++ for all  1 bool mapContainsKeysarrayltintgt nu.pdf
Use C++ for all 1 bool mapContainsKeysarrayltintgt nu.pdfadmin447081
 
This code i would want to work ssh compiling for the this ta.pdf
This code i would want to work ssh compiling for the this ta.pdfThis code i would want to work ssh compiling for the this ta.pdf
This code i would want to work ssh compiling for the this ta.pdfadmin447081
 

More from admin447081 (20)

Problem 7 The following fraction nonconforming control char.pdf
Problem 7 The following fraction nonconforming control char.pdfProblem 7 The following fraction nonconforming control char.pdf
Problem 7 The following fraction nonconforming control char.pdf
 
Donna and Chris Hoser have been married for three years Don.pdf
Donna and Chris Hoser have been married for three years Don.pdfDonna and Chris Hoser have been married for three years Don.pdf
Donna and Chris Hoser have been married for three years Don.pdf
 
On January 1 2021 Pembina Corporation a publicly traded c.pdf
On January 1 2021 Pembina Corporation a publicly traded c.pdfOn January 1 2021 Pembina Corporation a publicly traded c.pdf
On January 1 2021 Pembina Corporation a publicly traded c.pdf
 
Multinational organisations MNOs operate their activities .pdf
Multinational organisations MNOs operate their activities .pdfMultinational organisations MNOs operate their activities .pdf
Multinational organisations MNOs operate their activities .pdf
 
Las hembras de bonobo Pan paniscus pueden ir solas e int.pdf
Las hembras de bonobo Pan paniscus pueden ir solas e int.pdfLas hembras de bonobo Pan paniscus pueden ir solas e int.pdf
Las hembras de bonobo Pan paniscus pueden ir solas e int.pdf
 
Hawthorne almalar aadakilerin nemini ortaya kard Birini.pdf
Hawthorne almalar aadakilerin nemini ortaya kard  Birini.pdfHawthorne almalar aadakilerin nemini ortaya kard  Birini.pdf
Hawthorne almalar aadakilerin nemini ortaya kard Birini.pdf
 
a 5 points Prove that Y the vector of fitted values is.pdf
a 5 points Prove that Y the vector of fitted values is.pdfa 5 points Prove that Y the vector of fitted values is.pdf
a 5 points Prove that Y the vector of fitted values is.pdf
 
6 If X1X2Xn constitute a random sample of size n from a.pdf
6 If X1X2Xn constitute a random sample of size n from a.pdf6 If X1X2Xn constitute a random sample of size n from a.pdf
6 If X1X2Xn constitute a random sample of size n from a.pdf
 
1a Cul de los siguientes no es un ejemplo de un accionist.pdf
1a Cul de los siguientes no es un ejemplo de un accionist.pdf1a Cul de los siguientes no es un ejemplo de un accionist.pdf
1a Cul de los siguientes no es un ejemplo de un accionist.pdf
 
DEF Company also has preferred stock outstanding that pays a.pdf
DEF Company also has preferred stock outstanding that pays a.pdfDEF Company also has preferred stock outstanding that pays a.pdf
DEF Company also has preferred stock outstanding that pays a.pdf
 
4 Explain the usage of each tool that you identified above.pdf
4 Explain the usage of each tool that you identified above.pdf4 Explain the usage of each tool that you identified above.pdf
4 Explain the usage of each tool that you identified above.pdf
 
CASO INTEGRATIVO 30 IKEA estilo escandinavo Detrs de l.pdf
CASO INTEGRATIVO 30  IKEA estilo escandinavo  Detrs de l.pdfCASO INTEGRATIVO 30  IKEA estilo escandinavo  Detrs de l.pdf
CASO INTEGRATIVO 30 IKEA estilo escandinavo Detrs de l.pdf
 
1 a Cul es el nombre de la esfera que se encuentra en e.pdf
1  a Cul es el nombre de la esfera que se encuentra en e.pdf1  a Cul es el nombre de la esfera que se encuentra en e.pdf
1 a Cul es el nombre de la esfera que se encuentra en e.pdf
 
According to US Census data 716 of Americans are age 21.pdf
According to US Census data 716 of Americans are age 21.pdfAccording to US Census data 716 of Americans are age 21.pdf
According to US Census data 716 of Americans are age 21.pdf
 
1 Sosyal medya pazarlamasn SMM kullanmann avantajlar ile .pdf
1 Sosyal medya pazarlamasn SMM kullanmann avantajlar ile .pdf1 Sosyal medya pazarlamasn SMM kullanmann avantajlar ile .pdf
1 Sosyal medya pazarlamasn SMM kullanmann avantajlar ile .pdf
 
10 points Let continuous variables X1Xk be independentl.pdf
10 points Let continuous variables X1Xk be independentl.pdf10 points Let continuous variables X1Xk be independentl.pdf
10 points Let continuous variables X1Xk be independentl.pdf
 
1 Provide three examples of automatic data classifications .pdf
1 Provide three examples of automatic data classifications .pdf1 Provide three examples of automatic data classifications .pdf
1 Provide three examples of automatic data classifications .pdf
 
Theodore E Lariat is a single taxpayer born on September 22.pdf
Theodore E Lariat is a single taxpayer born on September 22.pdfTheodore E Lariat is a single taxpayer born on September 22.pdf
Theodore E Lariat is a single taxpayer born on September 22.pdf
 
Use C++ for all 1 bool mapContainsKeysarrayltintgt nu.pdf
Use C++ for all  1 bool mapContainsKeysarrayltintgt nu.pdfUse C++ for all  1 bool mapContainsKeysarrayltintgt nu.pdf
Use C++ for all 1 bool mapContainsKeysarrayltintgt nu.pdf
 
This code i would want to work ssh compiling for the this ta.pdf
This code i would want to work ssh compiling for the this ta.pdfThis code i would want to work ssh compiling for the this ta.pdf
This code i would want to work ssh compiling for the this ta.pdf
 

Recently uploaded

DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMELOISARIVERA8
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital ManagementMBA Assignment Experts
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppCeline George
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxAdelaideRefugio
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptxPoojaSen20
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi RajagopalEADTU
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...Nguyen Thanh Tu Collection
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽中 央社
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptxPoojaSen20
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code ExamplesPeter Brusilovsky
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesAmanpreetKaur157993
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismDabee Kamal
 

Recently uploaded (20)

DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 

Many times when we login to a system we use a usernamepass.pdf

  • 1. Many times when we login to a system, we use a username/password combination. For example, to login to the DTCC portal, you enter a username/password combination into a web form like what is displayed below Another option for authentication, and one that is used by cloud computing infrastructure environments such as AWS is to use a cryptographic key and pass the key to the server during login. In this lab, youll generate a cryptographic key to enable passwordless login to your Ubuntu VM. Step 1: Generate the keypair. On either your Windows10 VM or your Ubuntu VM, run the command: ssh- keygen You should see output similar to the following: Two files were created as a result of running this command: The file id_rsa is readable ONLY by the owner because it is the RSA Private key. This file should be guarded and treated as a password. The other file, id_rsa.pub is the RSA public key associated with the private key file. Step 2: To enable login to your Ubuntu VM using the certificate (and without entering a password) copy the id_rsa.pub file into your home directory in a file named .ssh/authorized_keys. Step 3: Login to your Ubuntu VM from your Windows 10 VM using the ssh command in a command window. You will need to supply the -i option and include the name and location of your RSA private key that you generated in step 1 Instructions
  • 2. Many times when we login to a system, we use a username/password combination. For example, to login to the DTCC portal, you enter a username/password combination into a web form like what is displayed below Another option for authentication, and one that is used by cloud computing infrastructure environments such as AWS is to use a cryptographic key and pass the key to the server during login. In this lab, youll generate a cryptographic key to enable passwordless login to your Ubuntu VM. Step 1: Generate the keypair. On either your Windows10 VM or your Ubuntu VM, run the command: ssh- keygen You should see output similar to the following: Two files were created as a result of running this command: The file id_rsa is readable ONLY by the owner because it is the RSA Private key. This file should be guarded and treated as a password. The other file, id_rsa.pub is the RSA public key associated with the private key file. Step 2: To enable login to your Ubuntu VM using the certificate (and without entering a password) copy the id_rsa.pub file into your home directory in a file named .ssh/authorized_keys. Step 3: Login to your Ubuntu VM from your Windows 10 VM using the ssh command in a command window. You will need to supply the -i option and include the name and location of your RSA private key that you generated in step 1