OpenSSH key management, Part 1

17

Author: JT Smith

IBM’s developerWorks site has the tutorial. “Many of us use the excellent OpenSSH as a secure, encrypted
replacement for the venerable telnet and rsh commands. One of OpenSSH’s more intriguing features is
its ability to authenticate users using the RSA and DSA authentication protocols, which are based on a
pair of complementary numerical keys.”