Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

OpenSSH Passwordless Authentication between 2 systems with different UID's

Posted on 2006-10-30
1
Medium Priority
?
1,214 Views
Last Modified: 2013-12-04
How to communicate without a passwd between 2 Unix systems where
the communicating sessions have different uid/s? (NOTE: both systems
are on OpenSSH)

e.g.


SystemA UserA SSH to SystemB UserB


Here is what I tried but failed.


As UserA in System A:



> ssh-keygen -t dsa
> cd ~/.ssh
> cat id_dsa.pub > authorized_keys2
> scp ./id_dsa.pub UserB@SystemB:.ssh/.  (when prompt for the passwd, I typed UserB's passwd)


As UserB in System B:


> cd .ssh
> cat id_dsa.pub > authorized_keys2


I tried the setup for the same user ID on both systems, it would work in the above example (i.e. SystemA UserA SSH to SystemB UserA)

Could someone tell me what am I missing?  Thank you very much!


0
Comment
Question by:cklh
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 48

Accepted Solution

by:
Tintin earned 400 total points
ID: 17845665
The correct steps are:

On system A as User A

ssh-keygen -t dsa
ssh userB@systemB "mkdir .ssh;chmod 700 .ssh"
cd ~/.ssh
scp id_dsa.pub userB@systemB:.ssh/authorized_keys

Then you should be able to do:

ssh userB@systemB
0

Featured Post

Looking for the Wi-Fi vendor that's right for you?

We know how difficult it can be to evaluate Wi-Fi vendors, so we created this helpful Wi-Fi Buyer's Guide to help you find the Wi-Fi vendor that's right for your business! Download the guide and get started on our checklist today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As I write this article, I am finishing cleanup from the Qakbot virus variant found in the wild on April 18, 2011.  It was a messy beast that had varying levels of infection, speculated as being dependent on how long it resided on the infected syste…
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
This course is ideal for IT System Administrators working with VMware vSphere and its associated products in their company infrastructure. This course teaches you how to install and maintain this virtualization technology to store data, prevent vuln…
Screencast - Getting to Know the Pipeline
Suggested Courses

610 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question