← Back to context Comment by eppp 2 years ago When I ssh to a device it asks me for a user name and password. Thats probably why. 6 comments eppp Reply PartiallyTyped 2 years ago They are saying, "why don't you use public key cryptograph to create an identity on the remote machine?". eppp 2 years ago I dont see that option when I ssh to a machine. If you want better defaults then offer them. I was being deliberately obtuse but barely. silviot 2 years ago I recommend you do set up key authentication. You'll get more convenient logins and better security. This page should document how to do it: https://www.ssh.com/academy/ssh/copy-id 2 replies → Aachen 2 years ago Which is commonly deployed via password authentication
PartiallyTyped 2 years ago They are saying, "why don't you use public key cryptograph to create an identity on the remote machine?". eppp 2 years ago I dont see that option when I ssh to a machine. If you want better defaults then offer them. I was being deliberately obtuse but barely. silviot 2 years ago I recommend you do set up key authentication. You'll get more convenient logins and better security. This page should document how to do it: https://www.ssh.com/academy/ssh/copy-id 2 replies → Aachen 2 years ago Which is commonly deployed via password authentication
eppp 2 years ago I dont see that option when I ssh to a machine. If you want better defaults then offer them. I was being deliberately obtuse but barely. silviot 2 years ago I recommend you do set up key authentication. You'll get more convenient logins and better security. This page should document how to do it: https://www.ssh.com/academy/ssh/copy-id 2 replies →
silviot 2 years ago I recommend you do set up key authentication. You'll get more convenient logins and better security. This page should document how to do it: https://www.ssh.com/academy/ssh/copy-id 2 replies →
They are saying, "why don't you use public key cryptograph to create an identity on the remote machine?".
I dont see that option when I ssh to a machine. If you want better defaults then offer them. I was being deliberately obtuse but barely.
I recommend you do set up key authentication. You'll get more convenient logins and better security. This page should document how to do it: https://www.ssh.com/academy/ssh/copy-id
2 replies →
Which is commonly deployed via password authentication