Kevin Coyner <[EMAIL PROTECTED]> writes:

> This is easily done when:
>
>     I have a useraccount on both machines under the same name (i.e.
>     kevin) and

This isn't a requirement;

>     I've generated a public key on my home machine using ssh-keygen and
>
>     copied that key to the .ssh/authorized_keys file on the host.
>
> But in my present case, the useraccount on my home box (client) is
> kevin, but the useraccount on the shared server (host) box is butakun.
>
> When I generate the publickey on the home box, it generates a key for
> [EMAIL PROTECTED] I can upload this to the SSH server (host), but automatic
> signin obviously isn't going to happen.

Have you tried?  The label on an ssh keypair is just a label; you can
change it if you want, but it doesn't particularly need to match the
username or hostname you're ssh'ing from.  A very common thing to do
is to drop a bunch of public keys into root's authorized_keys file,
for example, so that a specified set of administrators can securely
log in to the machine from their own accounts without knowing (or
possibly even having) the root password.

-- 
David Maze         [EMAIL PROTECTED]      http://people.debian.org/~dmaze/
"Theoretical politics is interesting.  Politicking should be illegal."
        -- Abra Mitchell


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to