0% found this document useful (0 votes)
14 views11 pages

SSHKey Generation For UNIX ServersV1.0

This document provides guidelines for generating SSH keys on Unix servers to enable passwordless login. It outlines considerations for key-based authentication and describes an 11-step process for generating an RSA key pair in PuTTYgen, including saving the private key locally and emailing the public key to the Linux team to update on servers. This allows application owners to then access servers via SSH tools like Putty without entering a password.

Uploaded by

kyitha91
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views11 pages

SSHKey Generation For UNIX ServersV1.0

This document provides guidelines for generating SSH keys on Unix servers to enable passwordless login. It outlines considerations for key-based authentication and describes an 11-step process for generating an RSA key pair in PuTTYgen, including saving the private key locally and emailing the public key to the Linux team to update on servers. This allows application owners to then access servers via SSH tools like Putty without entering a password.

Uploaded by

kyitha91
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Unix

SSH Key Generation for UNIX Server Access


(Enable password less/SSH key based user login)

Sensitivity: Internal & Restricted


Sensitivity: Internal & Restricted

Sensitivity: Internal & Restricted


Version History

Index Version Date Author Approver Remarks


1 Ver 1.0 21-July-2019 Akash Wadhwa Draft
Document

Review & Approval


Prepared By: Akash Wadhwa Senior System Administrator 21-July-2019

Reviewed By: Utpal Ghosh Technical Specialist 05-Aug-2019

Karthikeyan P Cloud & Infrastructure Services 05-Aug-2019


Manager

Approved By: Karthikeyan P Cloud & Infrastructure Services 05-Aug-2019


Manager
Process Owner: Wai Linn Htet (06-Aug-2019)

Applicable TO:
OOREDOO /System Admin/Application Owner

Note: The controlled copy of this document will be available in the server. Printed copies are uncontrolled.

Sensitivity: Internal & Restricted


Sensitivity: Internal & Restricted

Sensitivity: Internal & Restricted


Contents

1. Purpose ............................................................................................................................................... 4
2. Scope .................................................................................................................................................. 4
3. SSH key Generation Process ..................................................................................... Error! Bookmark not defined.

Sensitivity: Internal & Restricted


Sensitivity: Internal & Restricted

Sensitivity: Internal & Restricted


Purpose
This document provides the guidelines to generate SSH key.

Scope
This document provides the guidelines for Authenticating UNIX Servers using SSH
public/private keys instead of supplying User password over SSH client session.

Considerations
1. SSH (Private & Public) Key is based on User ID.

2. When you are using multiple users on any server for different purpose, Key for each Users would be
different and same should be shared to Linux Team to enable access.

3. SSH (Private & Public) Key are for user-based authentication and accessibility to servers will only be
allowed from your Source Workstation where Private Key is being imported in SSH client (ex. Putty,
WinSCP, Bitvise, Filezilla, etc.)

Internal Use Only


For Internal circulation only – unauthorized disclosure is against policy

Sensitivity: Internal & Restricted


Sensitivity: Internal & Restricted
SSH Key Generation Process

# Detailed Steps Comment / Note / Screenshots

1
Download the Attached file PuTTY.zip

Once downloaded, extract the file


2
and save it.

Once extracted, it will create an


3
executable file (puttygen.exe)

Internal Use Only


For Internal circulation only – unauthorized disclosure is against policy

Sensitivity: Internal & Restricted


Sensitivity: Internal & Restricted
Double click puttygen.exe for
4
generating ssh key’s.

Click on Generate (Please move


the mouse over the blank area for
fast key generation)
5
Note: Type of Key: RSA
No. of Bits: 2048

Internal Use Only


For Internal circulation only – unauthorized disclosure is against policy

Sensitivity: Internal & Restricted


Sensitivity: Internal & Restricted
Upon Completion, it will look like
6
given snippet.

Enter Key passphrase (Password


which you can remember and as
per OML Policy) (1 Upper Case, 1
Lower case, 1 numeric , 1 Special
Character, Minimum length : 8
alpha-numeric Characters)
7
Note: Once you lost the
passphrase, there is no way to
recover. Please ensure, you
remember the Key Passphrase.

Internal Use Only


For Internal circulation only – unauthorized disclosure is against policy

Sensitivity: Internal & Restricted


Sensitivity: Internal & Restricted
Click on Save Private key and save
8 under the location of your choice in
your laptop.

Give any name to your private key


9
and save it.

Now click on Save Public Key and


send via email to
10
[email protected];
[email protected]

Linux team will update the provided


Public key to UNIX Server. Once
done, Unix team will inform the
11 application Owner’s to try
accessing the servers via Putty or
Winscp.

Internal Use Only


For Internal circulation only – unauthorized disclosure is against policy

Sensitivity: Internal & Restricted


Sensitivity: Internal & Restricted

You might also like