SSH¶
SSH is a protocol that allows you to access computers remotely. In order to connect to I2S computers outside of Nichols Hall, ensure KU Anywhere is connected.
KU Anywhere
If you are using KU Anywhere, you must use the FQDN of the machine you want to connect to.
ssh hostname2.ittc.ku.edu
hostname2, it will not work.
SSH Keys¶
Using SSH public key authentication is a more secure alternative to logging in with a password. It relies on generating a pair of separate keys (a key pair), one "private" and the other "public". The private key should be kept secret and stored on the client computer you use to connect to the SSH gateway. The public key should be saved on the SSH gateway in an authorized_keys file in your .ssh/ directory. The Ed25519 algorithm is recommended when generating your key pair since it is the most secure algorithm available today. You can find more information about generating your key pair on different Operating Systems below.
ssh-keygen -t ed25519
The PuTTY SSH client includes the PuTTYgen key generation utility. You can find more information about generating a keypair using PuTTYgen at https://www.ssh.com/ssh/putty/windows/puttygen.