Follow

How to properly manage ssh keys for server access :: Päpper's Coding Blog — Have fun coding.

Every developer needs access to some servers for example to check the application logs. Usually, this is done using public-private key encryption where each developer generates their own public-private key pair. The public keys of each developer are added to the authorized_keys file on each server they should have access to.

paepper.com/blog/posts/how-to-

Sign in to participate in the conversation
Infosec Exchange

A Mastodon instance for info/cyber security-minded people.