Damien Miller | 8b1c22b | 2000-03-15 12:13:01 +1100 | [diff] [blame] | 1 | .ig \" -*- nroff -*- |
| 2 | Copyright (c) 1999 Philip Hands Computing <http://www.hands.com/> |
| 3 | |
| 4 | Permission is granted to make and distribute verbatim copies of |
| 5 | this manual provided the copyright notice and this permission notice |
| 6 | are preserved on all copies. |
| 7 | |
| 8 | Permission is granted to copy and distribute modified versions of this |
| 9 | manual under the conditions for verbatim copying, provided that the |
| 10 | entire resulting derived work is distributed under the terms of a |
| 11 | permission notice identical to this one. |
| 12 | |
| 13 | Permission is granted to copy and distribute translations of this |
| 14 | manual into another language, under the above conditions for modified |
| 15 | versions, except that this permission notice may be included in |
| 16 | translations approved by the Free Software Foundation instead of in |
| 17 | the original English. |
| 18 | .. |
| 19 | .TH SSH-COPY-ID 1 "14 November 1999" "OpenSSH" |
| 20 | .SH NAME |
| 21 | ssh-copy-id \- install your identity.pub in a remote machine's authorized_keys |
| 22 | .SH SYNOPSIS |
| 23 | .B ssh-copy-id [-i [identity_file]] |
| 24 | .I "[user@]machine" |
| 25 | .br |
| 26 | .SH DESCRIPTION |
| 27 | .BR ssh-copy-id |
| 28 | is a script that uses ssh to log into a remote machine (presumably |
| 29 | using a login password, so password authentication should be enabled, |
| 30 | unless you've done some clever use of multiple identities) |
| 31 | .PP |
| 32 | It also changes the permissions of the remote user's home, |
| 33 | .BR ~/.ssh , |
| 34 | and |
| 35 | .B ~/.ssh/authorized_keys |
| 36 | to remove group writability (which would otherwise prevent you from logging in, if the remote |
| 37 | .B sshd |
| 38 | has |
| 39 | .B StrictModes |
| 40 | set in its configuration). |
| 41 | .PP |
| 42 | If the |
| 43 | .B -i |
| 44 | option is given then the identity file (defaults to |
| 45 | .BR ~/.ssh/identity.pub ) |
| 46 | is used, regardless of whether there are any keys in your |
| 47 | .BR ssh-agent . |
| 48 | Otherwise, if this: |
| 49 | .PP |
| 50 | .B " ssh-add -L" |
| 51 | .PP |
| 52 | provides any output, it uses that in preference to the identity file. |
| 53 | .PP |
| 54 | If the |
| 55 | .B -i |
| 56 | option is used, or the |
| 57 | .B ssh-add |
| 58 | produced no output, then it uses the contents of the identity |
| 59 | file. Once it has one or more fingerprints (by whatever means) it |
| 60 | uses ssh to append them to |
Ben Lindstrom | 42717bf | 2000-12-28 15:46:20 +0000 | [diff] [blame] | 61 | .B ~/.ssh/authorized_keys |
Damien Miller | 8b1c22b | 2000-03-15 12:13:01 +1100 | [diff] [blame] | 62 | on the remote machine (creating the file, and directory, if necessary) |
| 63 | |
| 64 | .SH "SEE ALSO" |
| 65 | .BR ssh (1), |
| 66 | .BR ssh-agent (1), |
| 67 | .BR sshd (8) |