Connecting To Linux Using Putty
Connecting To Linux Using Putty
Connecting To Linux Using Putty
Providing for full password less, agent-based access requires a lot of steps, so we'll approach this in steps by first providing for regular passworded access to the system. This allows for testing of the initial installation and the ability to login before enabling the more advanced features.
It is helpful to have a shortcut on the desktop to make for easy access. To add this, right-click on the desktop and click New + Shortcut.
Launch PuTTY via the shortcut, and it will display the configuration dialog box:
When prompted, enter the username/password for your account on the remote system, and if correct, you'll receive a shell. Now you may begin working on the system.
Every time PuTTY connects with a server, it exchanges identification in the form of host keys. If the host key is unknown, or doesn't match what we've seen previously, it warns the user. For unknown hosts, this is mostly a pro forma operation, but for previously known systems it may suggest that the host is not the same one as originally connected.
You'll be prompted to create some randomness by moving the mouse around: this gives the system some additional entropy which helps create better keys. This takes just a few seconds to fully generate the keypair.
No!
Yes!
Once the Keypair has been generated, it will look similar to the below diagram.
Though the public key contains no sensitive information and will be installed on remote systems, the private key must be protected vigorously: anyone knowing the private key has full run of all remote systems.
The private key is in a PuTTY-specific format, which can't be used by any other software. It won't ever be looked at directly by the operator.
1. 2.
Under Saved Sessions select the server name which you wish to add the private Key to: e.g. TSMAPAPP-PROD-01 or TSMAPAPP-PROD-02 On the left columm: Navigate to Connection => Data, in the right panel populate the Auto Login username as csmp; Navigate to Connection => SSH => Auth in the Category pane on the left, then populate the Private key file for authentication field by browsing to the .ppk file saved previously.
3.
4.
Navigate to Session category level and select to Save located under the current saved session.
Repeated steps 1 to 4 for any additional saved server sessions you wish to add the Private Key to. At this point, PuTTY (on Windows) and OpenSSH (on Linux) are both configured for secure, public-key access.
Rather than prompt for the account's password (which will differ on every remote system), it's instead asking for the passphrase, which is protecting the local private key. When the private key fits into the public key on the OpenSSH server, access granted and a shell presented to the user. It's important to note that though the user must type a secret word when logging in, the passphrase is associated with the local private key, not the remote account. Even if the user's public key is installed on 1,000 different remote servers, the same private-key passphrase is demanded for all of them. This greatly simplifies the task of remembering access credentials and encourages the choosing of strong, secure ones.