Changes

From SME Server
Jump to navigationJump to search
Line 22: Line 22:  
The following has been tested using a Mitel SME Server, and Windows XP& RedHat 8.0 clients.
 
The following has been tested using a Mitel SME Server, and Windows XP& RedHat 8.0 clients.
   −
Some sections use [http://www.chiark.greenend.org.uk/~sgtatham/putty/ PuTTY] to connect to the server, it is a free implementation of SSH for Win32 platforms, with extensive [http://the.earth.li/~sgtatham/putty/latest/htmldoc/ online documentation]. See [http://www.carrollweb.net/putty/putty-howto.html Tom Carroll's HowTo] for details of how to use PuTTY.
+
Some sections use [http://www.chiark.greenend.org.uk/~sgtatham/putty/ PuTTY] to connect to the server, it is a free implementation of SSH for Win32 platforms, with extensive [http://the.earth.li/~sgtatham/putty/latest/htmldoc/ online documentation].  
    
== Generate Public-Private Key Pairs ==
 
== Generate Public-Private Key Pairs ==
Line 156: Line 156:  
=== In use with PuTTY ===
 
=== In use with PuTTY ===
   −
To start using PuTTY with SME Server see [http://www.carrollweb.net/putty/putty-howto.html Tom Carroll's HowTo]
+
To start using PuTTY with SME Server see [http://www.carrollweb.net/putty/putty-howto.html Tom Carroll's HowTo] (Link broken 12-30-2023). [https://www.techtarget.com/searchsecurity/tutorial/How-to-use-PuTTY-for-SSH-key-based-authentication How To Use Putty] is a basic tutorial.
   −
To use the Private Key go to the PuTTY Configuration and select the Connection - SSH - Auth.
+
To use the Private Key go to the PuTTY Configuration and select the Connectio/n - SSH - Auth.
 
Then in the ''Private key file for authentication'': enter the path to the private key file, or find it using ''Browse''.
 
Then in the ''Private key file for authentication'': enter the path to the private key file, or find it using ''Browse''.
   Line 207: Line 207:  
Lists the public keys that can be used to log into the user's account. This file must be readable by root. It is recommended that it not be accessible by others.
 
Lists the public keys that can be used to log into the user's account. This file must be readable by root. It is recommended that it not be accessible by others.
   −
Each line of the file contains one key (empty lines and lines starting with a `#' are ignored as comments). Each protocol version 2 public key consists of: options, key-type, base64 encoded key, comment. The comment field is not used for anything (but may be convenient for the user to identify the key).
+
Each line of the file contains one key (empty lines and lines starting with a `#' are ignored as comments). Each protocol version 2 public key consists of: options, key-type, base64 encoded key, comment. The comment field is not used for anything (but may be convenient for the user to identify the key)./
    
=== Changing the passphrase ===
 
=== Changing the passphrase ===
19

edits

Navigation menu