Configuring your Operative System (ssh public key)


SSH configuration:

Protocol version 2 provides a public key based user(PubkeyAuthentication) or client host (HostbasedAuthentication)authentication method, conventional password authenticationand challenge response based methods.
If your machine uses "ssh-protocol-1" you will not be able to use public keys...
The protocol settings for your machine can be selected by editing the "/etc/ssh/ssh_config" file.


Scientific Linux Cern:

For a more secure connection you can also set "ForwardX11 no", anyway this setting will not affect ssh behaviour concerning public keys.



Last update: July 4, 2005