ssh-copy-id.1 (189006) | ssh-copy-id.1 (214979) |
---|---|
1.ig \" -*- nroff -*- 2Copyright (c) 1999 Philip Hands Computing <http://www.hands.com/> 3 4Permission is granted to make and distribute verbatim copies of 5this manual provided the copyright notice and this permission notice 6are preserved on all copies. 7 8Permission is granted to copy and distribute modified versions of this --- 11 unchanged lines hidden (view full) --- 20.SH NAME 21ssh-copy-id \- install your public key in a remote machine's authorized_keys 22.SH SYNOPSIS 23.B ssh-copy-id [-i [identity_file]] 24.I "[user@]machine" 25.br 26.SH DESCRIPTION 27.BR ssh-copy-id | 1.ig \" -*- nroff -*- 2Copyright (c) 1999 Philip Hands Computing <http://www.hands.com/> 3 4Permission is granted to make and distribute verbatim copies of 5this manual provided the copyright notice and this permission notice 6are preserved on all copies. 7 8Permission is granted to copy and distribute modified versions of this --- 11 unchanged lines hidden (view full) --- 20.SH NAME 21ssh-copy-id \- install your public key in a remote machine's authorized_keys 22.SH SYNOPSIS 23.B ssh-copy-id [-i [identity_file]] 24.I "[user@]machine" 25.br 26.SH DESCRIPTION 27.BR ssh-copy-id |
28is a script that uses ssh to log into a remote machine (presumably 29using a login password, so password authentication should be enabled, 30unless you've done some clever use of multiple identities) 31.PP 32It also changes the permissions of the remote user's home, 33.BR ~/.ssh , 34and | 28is a script that uses ssh to log into a remote machine and 29append the indicated identity file to that machine's |
35.B ~/.ssh/authorized_keys | 30.B ~/.ssh/authorized_keys |
36to remove group writability (which would otherwise prevent you from logging in, if the remote 37.B sshd 38has 39.B StrictModes 40set in its configuration). | 31file. |
41.PP 42If the 43.B -i 44option is given then the identity file (defaults to 45.BR ~/.ssh/id_rsa.pub ) 46is used, regardless of whether there are any keys in your 47.BR ssh-agent . 48Otherwise, if this: --- 5 unchanged lines hidden (view full) --- 54If the 55.B -i 56option is used, or the 57.B ssh-add 58produced no output, then it uses the contents of the identity 59file. Once it has one or more fingerprints (by whatever means) it 60uses ssh to append them to 61.B ~/.ssh/authorized_keys | 32.PP 33If the 34.B -i 35option is given then the identity file (defaults to 36.BR ~/.ssh/id_rsa.pub ) 37is used, regardless of whether there are any keys in your 38.BR ssh-agent . 39Otherwise, if this: --- 5 unchanged lines hidden (view full) --- 45If the 46.B -i 47option is used, or the 48.B ssh-add 49produced no output, then it uses the contents of the identity 50file. Once it has one or more fingerprints (by whatever means) it 51uses ssh to append them to 52.B ~/.ssh/authorized_keys |
62on the remote machine (creating the file, and directory, if necessary) | 53on the remote machine (creating the file, and directory, if necessary.) |
63 | 54 |
55.SH NOTES 56This program does not modify the permissions of any 57pre-existing files or directories. Therefore, if the remote 58.B sshd 59has 60.B StrictModes 61set in its 62configuration, then the user's home, 63.B ~/.ssh 64folder, and 65.B ~/.ssh/authorized_keys 66file may need to have group writability disabled manually, e.g. via 67 68.B " chmod go-w ~ ~/.ssh ~/.ssh/authorized_keys" 69 70on the remote machine. 71 |
|
64.SH "SEE ALSO" 65.BR ssh (1), 66.BR ssh-agent (1), 67.BR sshd (8) | 72.SH "SEE ALSO" 73.BR ssh (1), 74.BR ssh-agent (1), 75.BR sshd (8) |