6-24
Configuring Secure Shell (SSH)
Further Information on SSH Client Public-Key Authentication
To Create a Client-Public-Key Text File. These steps describe how to
copy client-public-keys into the switch for RSA challenge-response authenti-
cation, and require an understanding of how to use your SSH client applica-
tion.
Figure 6-13. Example of a Client Public Key
Notes Comments in public key files, such as smith@support.cairns.com in figure 6-13,
may appear in a SSH client application’s generated public key. While such
comments may help to distinguish one key from another, they do not pose any
restriction on the use of a key by multiple clients and/or users.
Public key illustrations such as the key shown in figure 6-13 usually include
line breaks as a method for showing the whole key. However, in practice, line
breaks in a public key will cause errors resulting in authentication failure.
Bit Size Exponent <e>
Modulus <n>
Comment