An administrator needs to enable a fellow technician to access a remote Linux server for system management. Which of the following configurations will BEST ensure that the technician can connect securely without password authentication?
Use ssh-keygen to create a key pair and ssh-copy-id to copy the public key to the server.
Provide the technician with the server password to use with SSH.
Modify the ~/.ssh/config file on the technician's machine to include the server's information.
Instruct the technician to use ssh-add followed by the server's IP to access the server.
Using ssh-keygen to generate a key pair and then utilizing ssh-copy-id to deploy the public key to the server's ~/.ssh/authorized_keys file for the technician's account provides a secure, passwordless authentication method that utilizes SSH keys. The private key remains with the technician, who will use it for authentication. This is considered a best practice for remote access as it provides strong encryption and avoids the risks associated with password-based logins. Option B is incorrect because using passwords for SSH access is less secure than key-based authentication. Option C is incorrect because ssh-add adds private keys to the SSH agent but doesn't configure passwordless access to remote servers. Option D is incorrect because modifying ~/.ssh/config can define client-side connection parameters but does not facilitate passwordless login by itself.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does SSH key-based authentication work?
Open an interactive chat with Bash
What is the difference between `ssh-keygen` and `ssh-copy-id`?
Open an interactive chat with Bash
What are the security benefits of using SSH keys instead of passwords?