4 comments
  1. David,

    It truly depends on the circumstances and the situations. For example, the situation I’m writing for now is using Net::SSH::Perl to login to a customer’s machine and perform some basic tests and verifications on the environment. We don’t have control over the clients machine, so they’ll typically have us use a login/password combination. Every now and then we’ll be given a private key to use which is usable as well. If you’d want, I should be able to whip up some examples that use a key in place of the login/password combo, just let me know. =)

  2. Great post. How about a slight twist…using keys to ssh as a different user? For example i’m to do this from a cgi script on a web site but I don’t want to ssh to the remote host as apache/nobody?

    Thanks!

Add Comment

Required fields are marked *. Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.