SSH keys contain 2 pieces, a public key and a private key.
The public key is installed on whatever hardware you wish to SSH into. The private key is installed on the machine you will SSH from.
-
SSH into the server and run the below command to elevate to Root user, input the password you used to log in
su -i
-
Run the below commands\
mkdir -p ~/.ssh echo ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDhKliloNg32f9J8xtnLi0wal4FVnTYkNNQRhqTdPNcT [email protected] >> ~/.ssh/authorized_keys chmod -R go= ~/.ssh
-
Log into the server as an administrator
-
Open Powershell as administrator and run the below command\
echo "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDhKliloNg32f9J8xtnLi0wal4FVnTYkNNQRhqTdPNcT [email protected]" | Out-File -filepath $ENV:userprofile\.ssh\id_rsa.pub -Force -verbose
-
SSH into the server and SU into the Root account
-
Run the below commands
mkdir -p ~/.ssh/ nano ~/.ssh/id_rsa
-
In the text editor, copy and paste the contents of the Private Key and save
-
Run the below commands to make the key usable
chmod 700 ~/.ssh/ chmod 600 ~/.ssh/id_rsa
-
Log into the server as an administrator
-
Open Powershell as administrator and run the below command, putting the contents of the private key between the ""
$privkey = ""
-
Run the below command to output the private key into the keystore
echo $privkey | Out-File -filepath $ENV:userprofile.ssh\id_rsa -Force -verbose VERBOSE: Performing the operation "Output to File" on target "C:\Users\x.ssh\id_rsa"