Configuring SSH RSA Authentication for Remote Access

Adding RSA Token for Remote SSH Access

Question

A Linux systems administrator wants the ability to access systems remotely over SSH using RSA authentication.

To which of the following files should the RSA token be added to allow this access?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

C.

https://www.digitalocean.com/community/tutorials/how-to-configure-ssh-key-based-authentication-on-a-linux-server

The correct file to add the RSA token to allow SSH access is authorized_keys (option A).

The authorized_keys file is located in the .ssh directory in the user's home directory. This file contains a list of public keys that are authorized to access the user's account on the system. When a user attempts to connect to the system over SSH, the system checks the public key presented by the user against the list of authorized keys in the authorized_keys file.

To enable RSA authentication for SSH, the administrator needs to generate an RSA key pair (a private key and a public key). The private key is kept on the user's local machine, while the public key is added to the authorized_keys file on the remote system. The private key is used to authenticate the user's identity when connecting to the remote system.

The ~/.ssh/ssh_config file (option B) is the configuration file for the SSH client. This file is used to configure options for SSH connections, such as the preferred encryption algorithm and port number. It is not used to store authentication information.

The id_rsa.pub file (option C) contains the user's public key. This file is typically stored in the user's .ssh directory on their local machine. This file is used to add the user's public key to the authorized_keys file on the remote system.

The known_hosts file (option D) is a file that contains a list of host keys for remote systems that the user has connected to in the past. When the user connects to a remote system over SSH, the system's host key is checked against the list of known host keys in the known_hosts file to ensure that the user is connecting to the correct system. It is not used to store authentication information.