Securing SSH using Public Key authentication – Part 2: Accessing through SSH Client
Now after everything has been prepared on the server (read; Securing SSH using Public Key authentication – Part 1: Configuring the server) We can configure our laptop/PC/Workstation to access the server using Public Key. Open your PuTTY, add your server IP Server on Host Name, choose the Connection type to SSH. Named the sessions on […]