You have this special quality to explain things with simplicity.. Be it git or linux or python. I just enjoy your videos. A massive yes to your videos because you show hands on and not just theory. Awesome beyond Awesomeness
FINALLY - I have been messing with opening a dynamic tunnel from a linux machine TO a Mac for hours now. This tutorial (while backwards) was what I needed. Thanks Corey.
The way I remember is that the public key is like the lock on the door that everyone can try their private keys on, but only your private key will actually open the lock. Copying the Public key is just installing the lock on the door on the server, that only your private key can open. Great video btw!
As always, Corey explained the usage in a manner that is easily understood. I was stumped by the official SSH documentation because it doesn't clearly indicate which machine to copy the public key over to. Thank you Corey.
Holy shit thank you, I was trying to ssh into my ubuntu server through windows 11 and I knew it was way simpler than I was putting it out to be. Great and easy tutorial :)
This is by far the best and clearest explanation of how to implement k-b-a. I have used keys for a while but never fully understood the details. Thanks for this great tutorial Corey
Hey, Corey. I've used a couple of your tutorials so far. I set up (2) virtual Ubuntu-18.04 servers in VirtualBox on a host network with ssh keys login only. Since my host laptop is Ubuntu I do have the ssh-copy-id command but I'm glad you showed the "manual" way of configuring it too. Thanks again.
Great tuturial! Works on Windows to Linux too. If you use powershell the commands will be the same, just you have to type out your home directory manually when doing the scp instead of ~
Corey - ONCE AGAIN - in a matter of a few minutes - you have cleared a topic that was very unclear to me - THUMBS UP !!!!! Now - I do have a question - do you have a tutorial on what "ssh-agent" and "ssh-agent forwarding" is ? If I can "clear" these concepts in my mind - I will be "golden" ... Only "you" have the "charisma" to clear such tricky topics in a simplistic, comprehensive, and making it "stick" permanently in someone's brain. :) Let me know when you can. Thank you.
No, I don't have a video on anything like that yet. I'll write it down in my list of video suggestions though! I can't promise I'll get around to it soon since I have a couple of series' backed up at the moment, but I'll do what I can.
@@coreyms Thank you Corey - and one quick clarification - when someone becomes a "paid" member of your channel - does this mean I get access to more topics / classes than what we see here "free" in youtube ? Once again - I cannot express my gratitude for discovering you - which first and foremost proves that a "good teacher" is PRICELESS !!!! It's only now after many years of using ssh that I finally understood how things work under the hood .. And so many other topics ... I have passed your name to several colleagues and friends as well ... You are simply "Priceless" !!!!!
All of my content is currently available for free. I want everyone to be able to access it. Contributors allow me to keep everything free for everyone, so that’s really where that helps most! I do have a few extra perks for paid members, but it isn’t much. For example, I’ll occasionally make a members only post asking a question where I can get responses from paying members and prioritize those first. But mainly it’s just to help keep my classes free for everyone. Thanks for considering!
Excellent videos and tutorials Corey-- I've watched a ton of videos on the same subject matter and content and yours is hands down, the best I've come across. I did have one question, if you get a sec--- what did you have to setup script wise to that you see available software updates and security updates when login? I'm sure I could Google it, but since I'm here anyway I thought I'd ask.
Thanks this was really handy for me. I am using tunneling and had to ensure that both the public key for my personal machine and the tunnel were (concatentated) in the authorized_keys file.
If u don't know about using ssh, then this video is place u must to start from. It would be good if u would talk couple words about ssh-agent, but anyway thx, its 5+ video.
Awesome explanation (you are gifted). Looking at things from multiple server's perspective, I have yet to dwell deep into maintenance aspect of keys. How is one server's private key on your machine, separate from another server's private key? Do all of them show up with the same name but different hash content inside the file? I also wonder how could one know which key belongs to which server (if you have to do it again in the future). Is this something one has to maintain (by labeling, separating into different folders etc)? Also, what is the best practice if as a server admin, you have to do it for end-users who may not be CLI/Linux proficient?
I would like to add that it is quite handy to make a file named 'config' in the local .ssh folder and put: Host [your shortcode] HostName [hostname] IdentityFile ~/.ssh/[key file name] User [username] ... [copy the above for other servers] You can then type in de terminal 'ssh [your shortcode]' and log in directly.
Hey Corey, it looks like this video isn't in the "Linux/Max Tutorials" playlist, so it was not obvious for me to find. So I would suggest you add it to that playlist. Thanks!
After restarting my PC I have again have to type password for accessing my remote PC. I check the sshd_config file there and the one we un-commented line(in sshd_config) is same as we changed it. But then also it is asking for password. What could be the problem?
Well Explained. As a developer, it was bit difficult to understand others tutorial. Keep up the good work.
You have this special quality to explain things with simplicity.. Be it git or linux or python. I just enjoy your videos. A massive yes to your videos because you show hands on and not just theory. Awesome beyond Awesomeness
because he does not know himself
Simple, Clear and Short video about SSH. Just just nailed it. Awesome job!!
FINALLY - I have been messing with opening a dynamic tunnel from a linux machine TO a Mac for hours now. This tutorial (while backwards) was what I needed. Thanks Corey.
The way I remember is that the public key is like the lock on the door that everyone can try their private keys on, but only your private key will actually open the lock.
Copying the Public key is just installing the lock on the door on the server, that only your private key can open.
Great video btw!
Extremely clean and direct information. This soluton worked for me at the first trial! Thanks for taking the time to do this video.
This one's the winner! Great video, very helpful, thank you.
As always, Corey explained the usage in a manner that is easily understood. I was stumped by the official SSH documentation because it doesn't clearly indicate which machine to copy the public key over to. Thank you Corey.
I''ve looked 4-5 videos on how to do that, maybe I'm dumb asf but none helped me.
Your video was crystal clear and it instantly worked, thanks
Holy shit thank you, I was trying to ssh into my ubuntu server through windows 11 and I knew it was way simpler than I was putting it out to be. Great and easy tutorial :)
This is by far the best and clearest explanation of how to implement k-b-a.
I have used keys for a while but never fully understood the details.
Thanks for this great tutorial Corey
The quality and execution of this is so spot on to a tee - even 5 years old, this is golden content, thank you so much!
Genuinely, very clear demonstration, rarely one can find as perfect as this
Hey, Corey. I've used a couple of your tutorials so far. I set up (2) virtual Ubuntu-18.04 servers in VirtualBox on a host network with ssh keys login only. Since my host laptop is Ubuntu I do have the ssh-copy-id command but I'm glad you showed the "manual" way of configuring it too. Thanks again.
Thanks for this video, way more practical and informative than the others I found!
Short and sweet. I understood very clearly. awesome teacher. Waiting for more videos like this...
Yes! It makes sense to me now. Public key goes on the remote server in the authorized_keys file, it was so helpful to see this being done. THANK YOU!
Third time this year here. thanks for this great video
Fifth*
Hey there, i am back after some time :D
Great tuturial! Works on Windows to Linux too. If you use powershell the commands will be the same, just you have to type out your home directory manually when doing the scp instead of ~
Finally a simple tutorial, it's not all that hard you know... Thank you!!
As always: Perfect explained. Great vid !
Amazing tutorial. Concise and to-the-point!
I keep finding your videos. They are are so good. Thank you.
Good video!
Sometimes I didn't know I you were in the remote or in the main, but the information is accurate!
Thank you!
Thank you! This is by far the cleanest explanation
You just put the light in my head thanks man and all the best.
A clear and detailed explanation for a beginner and a clarification guide for a guru. Thank you.
Thanks a lot. Your explanation about using SSH-KEYS is very clear.
Very concise info that is applicable to any server. Thank you!
Great video. Pearl in the sea of confusing tutorials :D
Thanks for the quality videos, this is a very good place to learn.
Exactly what I was searching for. Thx a lot for the good job.
Thank you so much for this tutorial! Simple and well explained with all neccecary details!
Just stumbled upon this video. Nicely done and perfectly explained. Thank you.
Gracias. Muy bien, excelente. Me aclaraste mucho. En Windows también se debe usar scp para copiar el archivo de la llave pública a la máquina remota.
Corey... you saved my life!! Thank you for your clear explanation!
5 years and still amazing. ♥
Excellent. Exactly what I was looking for!!
Wow, you are an amazing instructor!
very good exaplanation in just 15 minutes
Thank you for the excellent tutorial and clear articulation ! loved it !
Excellent tutorial. I can now add this to my toolbelt.
great video, simple and to the point. thank you
Thanks You So Much For This Video.. Its really helped me a lot in understanding of SSH key based authentication
Great video great simple explanation! It made my day, many thanks!
Thank you! I've struggled with this for so long and this covers all variations so well, thanks!
Excellent video! Thanks for taking the time to educate me.
Great video and clear explanation. Thanks!
a video about ssh port forwarding of you would be legendary !!
Thanks for these wonderful tutorials Corey. I hope you keep receiving blessings, lots of blessings
Very clear, very good explanation, thanks
Awesome
now i got a safe way to enter my raspberry via pc and mobil
thank you
Amazing video Corey! Thank you very much :))
Wow, this was really helpful. Thank you!!
wow you are so amazing at keeping things easy to follow, successfull first try!
Thank You , It was A clear Explanation
thank you. I have successfully set up key-based authentication on the remote server
Corey - ONCE AGAIN - in a matter of a few minutes - you have cleared a topic that was very unclear to me - THUMBS UP !!!!! Now - I do have a question - do you have a tutorial on what "ssh-agent" and "ssh-agent forwarding" is ? If I can "clear" these concepts in my mind - I will be "golden" ... Only "you" have the "charisma" to clear such tricky topics in a simplistic, comprehensive, and making it "stick" permanently in someone's brain. :) Let me know when you can. Thank you.
No, I don't have a video on anything like that yet. I'll write it down in my list of video suggestions though! I can't promise I'll get around to it soon since I have a couple of series' backed up at the moment, but I'll do what I can.
@@coreyms Thank you Corey - and one quick clarification - when someone becomes a "paid" member of your channel - does this mean I get access to more topics / classes than what we see here "free" in youtube ?
Once again - I cannot express my gratitude for discovering you - which first and foremost proves that a "good teacher" is PRICELESS !!!! It's only now after many years of using ssh that I finally understood how things work under the hood .. And so many other topics ... I have passed your name to several colleagues and friends as well ... You are simply "Priceless" !!!!!
All of my content is currently available for free. I want everyone to be able to access it. Contributors allow me to keep everything free for everyone, so that’s really where that helps most! I do have a few extra perks for paid members, but it isn’t much. For example, I’ll occasionally make a members only post asking a question where I can get responses from paying members and prioritize those first. But mainly it’s just to help keep my classes free for everyone. Thanks for considering!
Well said!
Wow... Great explanation... As always in other videos.
Thank you so much. Nice Explanation.
Very clear explanations, thanks so much
Well Explained on Key based authentication
great explanation...so simple
I was waiting for this
Excellent videos and tutorials Corey-- I've watched a ton of videos on the same subject matter and content and yours is hands down, the best I've come across. I did have one question, if you get a sec--- what did you have to setup script wise to that you see available software updates and security updates when login? I'm sure I could Google it, but since I'm here anyway I thought I'd ask.
Hey there. Those were new installs of Ubuntu, so I didn't set up anything that I know of. I believe that may just be the default behavior.
Easily explained. Keep adding more :)
This is the best video. Thank you so much for this.
Really helpful video for beginners like me.
Great tutorial Corey, thank you.
Man, you're a goddamn good teacher 👍!
Thanks this was really handy for me. I am using tunneling and had to ensure that both the public key for my personal machine and the tunnel were (concatentated) in the authorized_keys file.
very well explained, thank you very much for your time.
I think we can also use "ssh-copy-id " to copy keys from host to ssh machine.
If u don't know about using ssh, then this video is place u must to start from. It would be good if u would talk couple words about ssh-agent, but anyway thx, its 5+ video.
clear and concise...excellent!!!
Well Explained. Thx a lot !
I immediately subscribed your channel .
excellent. precise and to the point..
awesome, best explanation like always.
what a good video!!! well explained
That was Excellent !!!
Excellent tutorial!
Awesome explanation (you are gifted). Looking at things from multiple server's perspective, I have yet to dwell deep into maintenance aspect of keys. How is one server's private key on your machine, separate from another server's private key? Do all of them show up with the same name but different hash content inside the file? I also wonder how could one know which key belongs to which server (if you have to do it again in the future). Is this something one has to maintain (by labeling, separating into different folders etc)? Also, what is the best practice if as a server admin, you have to do it for end-users who may not be CLI/Linux proficient?
I would like to add that it is quite handy to make a file named 'config' in the local .ssh folder and put:
Host [your shortcode]
HostName [hostname]
IdentityFile ~/.ssh/[key file name]
User [username]
...
[copy the above for other servers]
You can then type in de terminal 'ssh [your shortcode]' and log in directly.
This is the best tutorial ever
That's amzaing tutorial. Thank you so much!
Awesome tutorial. Thanks a lot.
Hey Corey,
it looks like this video isn't in the "Linux/Max Tutorials" playlist, so it was not obvious for me to find. So I would suggest you add it to that playlist.
Thanks!
Oh, I must have missed that. Just added it. Thanks!
I really need to start learning Linux.
I put it off for a long time, but when I finally took the plunge I found that it made my life so much easier. I would highly recommend it.
I also really need to get better acquainted with Linux. Once my second PC arrives at my place, I will check out your tutorials and set up Linux =)
Yes you do!
well explained, thank you!
11:40 - where you can use the 2nd of 2 methods for ssh.
Nice Tutorial. Correct me when I'm wrong, I usually use the command "ssh-copy-id user@server.ip" to do pretty the same thing.
Really awesome tutorial.
Thank you this helped a lot.
I highly recommend this video
Thank you again Corey.
excellent, thanks Corey. I'm guessing there is no issue with renaming these priv/pub key files after creation?
Very useful thank you 😍
I've been having difficulty using Python to connect to a MySQL database via SSH. I would love for you to do a video on that.
After restarting my PC I have again have to type password for accessing my remote PC. I check the sshd_config file there and the one we un-commented line(in sshd_config) is same as we changed it. But then also it is asking for password. What could be the problem?
Did you figure out what was wrong? Or did you manage to find a solution?