Email our fast, friendly support if you have a question not covered here: [email protected].
Linux has OpenSSH built right in! Here’s how to set it up:
First, generate a new ssh key:
mkdir ~/.ssh/ ssh-keygen -C "[email protected]"
When the command asks you where to save your key, just hit enter.
When prompted, a long, strong passphrase is recommended (use a phrase that only you know; it’s not necessary to mix in extra punctuation if the passphrase is at least 5 or 6 randomly-chosen words.) You’ll only have to type it in when you log into your desktop, not every time you want to log into a server (huge advantage over using a password!). You can leave the other prompts blank.
You’ll only have to type your passphrase in when you log into your Linux
desktop session, not every time you want to log into a server. Since you’re
using Userify, if you forget your passphrase in the future, it’s easy to
.ssh/id_ed25519* and then re-deploy a fresh key.
This will generate your SSH private key in the file
~/.ssh/id_ed25519 and your
public key in the file
~/.ssh/id_ed25519.pub. (Note the
(~ is shorthand for your home directory, i.e., /home/username)
Upload your public key to Userify by copying and pasting the contents of
~/.ssh/id_ed25519.pub in your home directory to Userify. Just cat the file and
copy it from your terminal and paste it into Userify:
If you have set a passphrase for your key (suggested for greater security), most Linux distributions already have built-in key managers that will work automatically.
From now on, you can connect to any Userify-enabled server without typing a password, just by typing in:
If your Userify username is different from your
Linux username, you can either
each time or just add the following to
and then just
ssh IP and drop your username from the command.
In your home directory’s .ssh/ directory, create a file named
Host * User YourUserifyUsername IdentityFile ~/.ssh/id_ed25519
Start managing your users and SSH keys in seconds Try for free