Implementation of key based authentications
*******************************************************************************************Step by Step Implementation of key based authentications from Source A to Destination B. ******************************************************************************************* (1) At source A (1-A) Generate a Key ssh-keygen -t dsa Above command creates a public key file called : id_dsa.pub and private key called id_dsa (1-B) Cat id_dsa.pub to the destination B and save as a file called authorized_keys…
