Authenticate with a private key
Clash Royale CLAN TAG#URR8PPP
up vote
0
down vote
favorite
Is it possible to authenticate myself with the private key at the public key?
The scenario: I gave another company the public key so that I can authenticate myself with my private key at the sftp server.
Is this "backwards asymmetric encryption" possible?
If not, can someone explain why?
linux ssh sftp key-authentication
add a comment |
up vote
0
down vote
favorite
Is it possible to authenticate myself with the private key at the public key?
The scenario: I gave another company the public key so that I can authenticate myself with my private key at the sftp server.
Is this "backwards asymmetric encryption" possible?
If not, can someone explain why?
linux ssh sftp key-authentication
3
"I gave another company the public key so I can authenticate myself with my private key at the sftp server" - That's how it works.
– Martin Prikryl
Nov 28 at 16:10
add a comment |
up vote
0
down vote
favorite
up vote
0
down vote
favorite
Is it possible to authenticate myself with the private key at the public key?
The scenario: I gave another company the public key so that I can authenticate myself with my private key at the sftp server.
Is this "backwards asymmetric encryption" possible?
If not, can someone explain why?
linux ssh sftp key-authentication
Is it possible to authenticate myself with the private key at the public key?
The scenario: I gave another company the public key so that I can authenticate myself with my private key at the sftp server.
Is this "backwards asymmetric encryption" possible?
If not, can someone explain why?
linux ssh sftp key-authentication
linux ssh sftp key-authentication
edited Nov 28 at 16:45
Jeff Schaller
37.2k1052121
37.2k1052121
asked Nov 28 at 16:00
Can Lotoz
31
31
3
"I gave another company the public key so I can authenticate myself with my private key at the sftp server" - That's how it works.
– Martin Prikryl
Nov 28 at 16:10
add a comment |
3
"I gave another company the public key so I can authenticate myself with my private key at the sftp server" - That's how it works.
– Martin Prikryl
Nov 28 at 16:10
3
3
"I gave another company the public key so I can authenticate myself with my private key at the sftp server" - That's how it works.
– Martin Prikryl
Nov 28 at 16:10
"I gave another company the public key so I can authenticate myself with my private key at the sftp server" - That's how it works.
– Martin Prikryl
Nov 28 at 16:10
add a comment |
2 Answers
2
active
oldest
votes
up vote
0
down vote
accepted
You always put the public key on the remote server you want to login to. The private key is meant to remain private to you.
So, with ssh, you put the public key into the authorized_keys
file on the server you want to login to (or have the admin do it, if you don't have the ability yourself).
Now you can use the private key to access that remote server.
In general, you shouldn't give your private key to anyone; that's why it's called private.
add a comment |
up vote
0
down vote
Generalized and Simplified Public Key Authentication
Asymmetric key pairs used for authentication are mathematically designed so as to be difficult to compute the private key using the public key. This means one can effectively distribute the public key to anyone. The private key is used to generate a cryptographic token by the client which is verified using the public key on the server.
Since the whole point of authentication is to ensure that the entity attempting to be authenticated is the owner of the private key, the question is really moot.
add a comment |
2 Answers
2
active
oldest
votes
2 Answers
2
active
oldest
votes
active
oldest
votes
active
oldest
votes
up vote
0
down vote
accepted
You always put the public key on the remote server you want to login to. The private key is meant to remain private to you.
So, with ssh, you put the public key into the authorized_keys
file on the server you want to login to (or have the admin do it, if you don't have the ability yourself).
Now you can use the private key to access that remote server.
In general, you shouldn't give your private key to anyone; that's why it's called private.
add a comment |
up vote
0
down vote
accepted
You always put the public key on the remote server you want to login to. The private key is meant to remain private to you.
So, with ssh, you put the public key into the authorized_keys
file on the server you want to login to (or have the admin do it, if you don't have the ability yourself).
Now you can use the private key to access that remote server.
In general, you shouldn't give your private key to anyone; that's why it's called private.
add a comment |
up vote
0
down vote
accepted
up vote
0
down vote
accepted
You always put the public key on the remote server you want to login to. The private key is meant to remain private to you.
So, with ssh, you put the public key into the authorized_keys
file on the server you want to login to (or have the admin do it, if you don't have the ability yourself).
Now you can use the private key to access that remote server.
In general, you shouldn't give your private key to anyone; that's why it's called private.
You always put the public key on the remote server you want to login to. The private key is meant to remain private to you.
So, with ssh, you put the public key into the authorized_keys
file on the server you want to login to (or have the admin do it, if you don't have the ability yourself).
Now you can use the private key to access that remote server.
In general, you shouldn't give your private key to anyone; that's why it's called private.
answered Nov 28 at 16:35
Stephen Harris
23.4k24376
23.4k24376
add a comment |
add a comment |
up vote
0
down vote
Generalized and Simplified Public Key Authentication
Asymmetric key pairs used for authentication are mathematically designed so as to be difficult to compute the private key using the public key. This means one can effectively distribute the public key to anyone. The private key is used to generate a cryptographic token by the client which is verified using the public key on the server.
Since the whole point of authentication is to ensure that the entity attempting to be authenticated is the owner of the private key, the question is really moot.
add a comment |
up vote
0
down vote
Generalized and Simplified Public Key Authentication
Asymmetric key pairs used for authentication are mathematically designed so as to be difficult to compute the private key using the public key. This means one can effectively distribute the public key to anyone. The private key is used to generate a cryptographic token by the client which is verified using the public key on the server.
Since the whole point of authentication is to ensure that the entity attempting to be authenticated is the owner of the private key, the question is really moot.
add a comment |
up vote
0
down vote
up vote
0
down vote
Generalized and Simplified Public Key Authentication
Asymmetric key pairs used for authentication are mathematically designed so as to be difficult to compute the private key using the public key. This means one can effectively distribute the public key to anyone. The private key is used to generate a cryptographic token by the client which is verified using the public key on the server.
Since the whole point of authentication is to ensure that the entity attempting to be authenticated is the owner of the private key, the question is really moot.
Generalized and Simplified Public Key Authentication
Asymmetric key pairs used for authentication are mathematically designed so as to be difficult to compute the private key using the public key. This means one can effectively distribute the public key to anyone. The private key is used to generate a cryptographic token by the client which is verified using the public key on the server.
Since the whole point of authentication is to ensure that the entity attempting to be authenticated is the owner of the private key, the question is really moot.
answered Nov 28 at 16:49
RubberStamp
1,7301518
1,7301518
add a comment |
add a comment |
Thanks for contributing an answer to Unix & Linux Stack Exchange!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Some of your past answers have not been well-received, and you're in danger of being blocked from answering.
Please pay close attention to the following guidance:
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f484703%2fauthenticate-with-a-private-key%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
3
"I gave another company the public key so I can authenticate myself with my private key at the sftp server" - That's how it works.
– Martin Prikryl
Nov 28 at 16:10