]>
Commit | Line | Data |
---|---|---|
3c0ef626 | 1 | .ig \" -*- nroff -*- |
2 | Copyright (c) 1999 Philip Hands Computing <http://www.hands.com/> | |
3 | ||
4 | Permission is granted to make and distribute verbatim copies of | |
5 | this manual provided the copyright notice and this permission notice | |
6 | are preserved on all copies. | |
7 | ||
8 | Permission is granted to copy and distribute modified versions of this | |
9 | manual under the conditions for verbatim copying, provided that the | |
10 | entire resulting derived work is distributed under the terms of a | |
11 | permission notice identical to this one. | |
12 | ||
13 | Permission is granted to copy and distribute translations of this | |
14 | manual into another language, under the above conditions for modified | |
15 | versions, except that this permission notice may be included in | |
16 | translations approved by the Free Software Foundation instead of in | |
17 | the original English. | |
18 | .. | |
19 | .TH SSH-COPY-ID 1 "14 November 1999" "OpenSSH" | |
20 | .SH NAME | |
21 | ssh-copy-id \- install your identity.pub in a remote machine's authorized_keys | |
22 | .SH SYNOPSIS | |
23 | .B ssh-copy-id [-i [identity_file]] | |
24 | .I "[user@]machine" | |
25 | .br | |
26 | .SH DESCRIPTION | |
27 | .BR ssh-copy-id | |
28 | is a script that uses ssh to log into a remote machine (presumably | |
29 | using a login password, so password authentication should be enabled, | |
30 | unless you've done some clever use of multiple identities) | |
31 | .PP | |
32 | It also changes the permissions of the remote user's home, | |
33 | .BR ~/.ssh , | |
34 | and | |
35 | .B ~/.ssh/authorized_keys | |
36 | to remove group writability (which would otherwise prevent you from logging in, if the remote | |
37 | .B sshd | |
38 | has | |
39 | .B StrictModes | |
40 | set in its configuration). | |
41 | .PP | |
42 | If the | |
43 | .B -i | |
44 | option is given then the identity file (defaults to | |
45 | .BR ~/.ssh/identity.pub ) | |
46 | is used, regardless of whether there are any keys in your | |
47 | .BR ssh-agent . | |
48 | Otherwise, if this: | |
49 | .PP | |
50 | .B " ssh-add -L" | |
51 | .PP | |
52 | provides any output, it uses that in preference to the identity file. | |
53 | .PP | |
54 | If the | |
55 | .B -i | |
56 | option is used, or the | |
57 | .B ssh-add | |
58 | produced no output, then it uses the contents of the identity | |
59 | file. Once it has one or more fingerprints (by whatever means) it | |
60 | uses ssh to append them to | |
61 | .B ~/.ssh/authorized_keys | |
62 | on the remote machine (creating the file, and directory, if necessary) | |
63 | ||
64 | .SH "SEE ALSO" | |
65 | .BR ssh (1), | |
66 | .BR ssh-agent (1), | |
67 | .BR sshd (8) |