Mike Lockwood | 46aaaa6 | 2011-12-07 08:17:59 -0800 | [diff] [blame] | 1 | .ig \" -*- nroff -*- |
| 2 | Copyright (c) 1999 Philip Hands Computing <http://www.hands.com/> |
| 3 | |
| 4 | Permission is granted to make and distribute verbatim copies of |
| 5 | this manual provided the copyright notice and this permission notice |
| 6 | are preserved on all copies. |
| 7 | |
| 8 | Permission is granted to copy and distribute modified versions of this |
| 9 | manual under the conditions for verbatim copying, provided that the |
| 10 | entire resulting derived work is distributed under the terms of a |
| 11 | permission notice identical to this one. |
| 12 | |
| 13 | Permission is granted to copy and distribute translations of this |
| 14 | manual into another language, under the above conditions for modified |
| 15 | versions, except that this permission notice may be included in |
| 16 | translations approved by the Free Software Foundation instead of in |
| 17 | the original English. |
| 18 | .. |
| 19 | .TH SSH-COPY-ID 1 "14 November 1999" "OpenSSH" |
| 20 | .SH NAME |
| 21 | ssh-copy-id \- install your public key in a remote machine's authorized_keys |
| 22 | .SH SYNOPSIS |
| 23 | .B ssh-copy-id [-i [identity_file]] |
| 24 | .I "[user@]machine" |
| 25 | .br |
| 26 | .SH DESCRIPTION |
| 27 | .BR ssh-copy-id |
| 28 | is a script that uses ssh to log into a remote machine and |
| 29 | append the indicated identity file to that machine's |
| 30 | .B ~/.ssh/authorized_keys |
| 31 | file. |
| 32 | .PP |
| 33 | If the |
| 34 | .B -i |
| 35 | option is given then the identity file (defaults to |
| 36 | .BR ~/.ssh/id_rsa.pub ) |
| 37 | is used, regardless of whether there are any keys in your |
| 38 | .BR ssh-agent . |
| 39 | Otherwise, if this: |
| 40 | .PP |
| 41 | .B " ssh-add -L" |
| 42 | .PP |
| 43 | provides any output, it uses that in preference to the identity file. |
| 44 | .PP |
| 45 | If the |
| 46 | .B -i |
| 47 | option is used, or the |
| 48 | .B ssh-add |
| 49 | produced no output, then it uses the contents of the identity |
| 50 | file. Once it has one or more fingerprints (by whatever means) it |
| 51 | uses ssh to append them to |
| 52 | .B ~/.ssh/authorized_keys |
| 53 | on the remote machine (creating the file, and directory, if necessary.) |
| 54 | |
| 55 | .SH NOTES |
| 56 | This program does not modify the permissions of any |
| 57 | pre-existing files or directories. Therefore, if the remote |
| 58 | .B sshd |
| 59 | has |
| 60 | .B StrictModes |
| 61 | set in its |
| 62 | configuration, then the user's home, |
| 63 | .B ~/.ssh |
| 64 | folder, and |
| 65 | .B ~/.ssh/authorized_keys |
| 66 | file may need to have group writability disabled manually, e.g. via |
| 67 | |
| 68 | .B " chmod go-w ~ ~/.ssh ~/.ssh/authorized_keys" |
| 69 | |
| 70 | on the remote machine. |
| 71 | |
| 72 | .SH "SEE ALSO" |
| 73 | .BR ssh (1), |
| 74 | .BR ssh-agent (1), |
| 75 | .BR sshd (8) |