blob: f25ed01f2a6e555db91400e16cac6e76a95ad517 [file] [log] [blame]
Damien Miller8b1c22b2000-03-15 12:13:01 +11001.ig \" -*- nroff -*-
2Copyright (c) 1999 Philip Hands Computing <http://www.hands.com/>
3
4Permission is granted to make and distribute verbatim copies of
5this manual provided the copyright notice and this permission notice
6are preserved on all copies.
7
8Permission is granted to copy and distribute modified versions of this
9manual under the conditions for verbatim copying, provided that the
10entire resulting derived work is distributed under the terms of a
11permission notice identical to this one.
12
13Permission is granted to copy and distribute translations of this
14manual into another language, under the above conditions for modified
15versions, except that this permission notice may be included in
16translations approved by the Free Software Foundation instead of in
17the original English.
18..
19.TH SSH-COPY-ID 1 "14 November 1999" "OpenSSH"
20.SH NAME
Damien Miller02666772009-01-21 20:29:20 +110021ssh-copy-id \- install your public key in a remote machine's authorized_keys
Damien Miller8b1c22b2000-03-15 12:13:01 +110022.SH SYNOPSIS
23.B ssh-copy-id [-i [identity_file]]
24.I "[user@]machine"
25.br
26.SH DESCRIPTION
27.BR ssh-copy-id
28is a script that uses ssh to log into a remote machine (presumably
29using a login password, so password authentication should be enabled,
30unless you've done some clever use of multiple identities)
31.PP
32It also changes the permissions of the remote user's home,
33.BR ~/.ssh ,
34and
35.B ~/.ssh/authorized_keys
36to remove group writability (which would otherwise prevent you from logging in, if the remote
37.B sshd
38has
39.B StrictModes
40set in its configuration).
41.PP
42If the
43.B -i
44option is given then the identity file (defaults to
Damien Miller02666772009-01-21 20:29:20 +110045.BR ~/.ssh/id_rsa.pub )
Damien Miller8b1c22b2000-03-15 12:13:01 +110046is used, regardless of whether there are any keys in your
47.BR ssh-agent .
48Otherwise, if this:
49.PP
50.B " ssh-add -L"
51.PP
52provides any output, it uses that in preference to the identity file.
53.PP
54If the
55.B -i
56option is used, or the
57.B ssh-add
58produced no output, then it uses the contents of the identity
59file. Once it has one or more fingerprints (by whatever means) it
60uses ssh to append them to
Ben Lindstrom42717bf2000-12-28 15:46:20 +000061.B ~/.ssh/authorized_keys
Damien Miller8b1c22b2000-03-15 12:13:01 +110062on the remote machine (creating the file, and directory, if necessary)
63
64.SH "SEE ALSO"
65.BR ssh (1),
66.BR ssh-agent (1),
67.BR sshd (8)