If you do not wish to type your password in every time
you use ssh(1), and you use keys to
authenticate, ssh-agent(1) is there for your
convenience. If you want to use ssh-agent(1), make
sure that you run it before running other applications. X
users, for example, usually do this from their
.xsession
or
.xinitrc
. See ssh-agent(1) for
details.
Generate a key pair using ssh-keygen(1). The key
pair will wind up in your
$HOME/.ssh/
directory.
Only ECDSA, Ed25519 or RSA keys are supported.
Send your public key
($HOME/.ssh/id_ecdsa.pub
,
$HOME/.ssh/id_ed25519.pub
, or
$HOME/.ssh/id_rsa.pub
)
to the person setting you up as a committer so it can be put
into
in
yourlogin
/etc/ssh-keys/
on
freefall
.
Now ssh-add(1) can be used for
authentication once per session. It prompts for
the private key's pass phrase, and then stores it in the
authentication agent (ssh-agent(1)). Use ssh-add
-d
to remove keys stored in the agent.
Test with a simple remote command: ssh
freefall.FreeBSD.org ls /usr
.
For more information, see security/openssh-portable, ssh(1), ssh-add(1), ssh-agent(1), ssh-keygen(1), and scp(1).
For information on adding, changing, or removing ssh(1)
keys, see this
article
.
All FreeBSD documents are available for download at https://download.freebsd.org/ftp/doc/
Questions that are not answered by the
documentation may be
sent to <freebsd-questions@FreeBSD.org>.
Send questions about this document to <freebsd-doc@FreeBSD.org>.