%PDF- %PDF-
| Direktori : /usr/share/help/C/seahorse/ |
| Current File : //usr/share/help/C/seahorse/about-ssh.page |
<page xmlns="http://projectmallard.org/1.0/"
xmlns:its="http://www.w3.org/2005/11/its"
type="topic" style="task"
id="about-ssh">
<info>
<link type="guide" xref="concepts" group="first"/>
<revision version="0.1" date="2011-10-23" status="stub"/>
<include href="legal.xml" xmlns="http://www.w3.org/2001/XInclude"/>
<credit type="author">
<name>Jim Campbell</name>
<email its:translate="no">jwcampbell@gmail.com</email>
<years>2013</years>
</credit>
<desc>SSH keys are used to login to a remote computer, once a secure
connection has been established.</desc>
</info>
<title>What is a Secure Shell key?</title>
<p>A <em>Secure Shell key</em>, often just called an <em>SSH key</em>,
helps you create a secure connection over an unsecured network.</p>
<list>
<title>An SSH key actually consists of two parts:</title>
<item><p>A public key, which is widely available.</p></item>
<item><p>A private key, which is kept secret. The private key is used
to unlock messages encrypted with a corresponding public key.</p></item>
</list>
<p>The advantage of using an <em>SSH key</em> to create a connection between
computers is that only the <em>Public key</em> needs to be sent over
the network. Transmissions encrypted with a <em>Public key</em> can only be
decoded by unlocking them with the corresponding <em>Private key</em> and a
password. Because only the public key is sent over the network, the key's
password is kept secret.</p>
</page>