How does SSH or secure shell password-less authentication work? this is what we going to learn in this video and stay tuned for a hands-on at the end.

If you have an ssh client you can connect to a machine with an ssh-server by providing the password of the requested user, if the password is correct the server will let you in.

this is however frowned upon because passwords can be guessed, rainbowed or brute forced

That is why we go back to good old public key cryptography for our help, watch my video on encryption here to learn more about symmetric and asymmetric encryption.

The client in this case will generate two keys, public and private key, public key that can be safely shared and private key that should be kept secure

The client then shares its public key with the server to whom it wishes to establish password-less authentication with, this is done through an existing authenticated session of course.

Next time the client wants to connect to the server it will present its public key, the server will look through its authenticated keys list and find that key but that is not enough, the server will encrypt a message using the public key and send it back to the client to prove that it owns the private key. If the client manages to decrypt the message that means it owns the private key and it will let it in.

Thank you so much for watching, subscribe for more and if you want to see how I enable password-less authentication on my raspberrypi you may stay little longer for that.

ssh-keygen -t rsa
ssh-copy-id remote_username@server_ip_address

#security #web-development #developer #programming

How SSH Password-less Authentication Work in 4 Minutes (with Example)
1.55 GEEK