Generate SSH Keys

Three steps to generate and install your own SSH keys. Never use a password to log into the Linux server again.

Generate SSH Keys
Photo by Silas Köhler / Unsplash

In today's digital world, securing your access to servers is crucial. One of the most secure and efficient methods is using ED25519 SSH keys. In this guide, I'll walk you through generating these keys and adding the public key to a different server. Let's get started!

Step 1: Generate ED25519 SSH Keys

  1. Open your terminal.
ssh-keygen -t ed25519 -C [YOUR EMAIL]
    • The -t ed25519 flag specifies the type of key to generate.
    • The -C flag adds a comment, typically your email address, to help identify the key.
  1. Follow the prompts:
    • You will be asked where to save the new key. Press Enter to accept the default location (~/.ssh/id_ed25519).
    • You can set a passphrase for added security, but it's optional. If you set one, you'll need to enter it whenever you use the private key.

Your ED25519 SSH key pair is now generated. The private key is stored in ~/.ssh/id_ed25519, and the public key is in ~/.ssh/id_ed25519.pub.

Step 2: Add the Public Key to a Different Server

On the machine where you generated the key, grab a copy of the public key from the file. You can use the following command:

cat ~/.ssh/id_ed25519.pub

Log in to the remote server:

ssh [USERNAME]@[DOMAIN OR IP]

Enter your password for the last time.

Create or open the ~/.ssh/authorized_keys file on the remote server:

mkdir ~/.ssh
nano ~/.ssh/authorized_keys

Paste the public key into the authorized_keys file on it's own line.

Save and close the file (if using nano, press Ctrl+X, then Y, and Enter).

Step 3: Test Your SSH Access

ssh [USERNAME]@[DOMAIN OR IP]

If everything is set up correctly, you should be able to log in without needing a password.

Conclusion

Congratulations! You've successfully generated an ED25519 SSH key pair and added the public key to a remote server. This setup enhances your server's security and simplifies your login process. Remember to keep your private key secure and consider using a passphrase for additional protection.