Home | History | Annotate | Download | only in contrib
      1 .ig \"  -*- nroff -*-
      2 Copyright (c) 1999 Philip Hands Computing <http://www.hands.com/>
      3 
      4 Permission is granted to make and distribute verbatim copies of
      5 this manual provided the copyright notice and this permission notice
      6 are preserved on all copies.
      7 
      8 Permission is granted to copy and distribute modified versions of this
      9 manual under the conditions for verbatim copying, provided that the
     10 entire resulting derived work is distributed under the terms of a
     11 permission notice identical to this one.
     12 
     13 Permission is granted to copy and distribute translations of this
     14 manual into another language, under the above conditions for modified
     15 versions, except that this permission notice may be included in
     16 translations approved by the Free Software Foundation instead of in
     17 the original English.
     18 ..
     19 .TH SSH-COPY-ID 1 "14 November 1999" "OpenSSH"
     20 .SH NAME
     21 ssh-copy-id \- install your public key in a remote machine's authorized_keys
     22 .SH SYNOPSIS
     23 .B ssh-copy-id [-i [identity_file]]
     24 .I "[user@]machine"
     25 .br
     26 .SH DESCRIPTION
     27 .BR ssh-copy-id
     28 is a script that uses ssh to log into a remote machine and
     29 append the indicated identity file to that machine's
     30 .B ~/.ssh/authorized_keys
     31 file.
     32 .PP
     33 If the
     34 .B -i
     35 option is given then the identity file (defaults to
     36 .BR ~/.ssh/id_rsa.pub )
     37 is used, regardless of whether there are any keys in your
     38 .BR ssh-agent .
     39 Otherwise, if this:
     40 .PP
     41 .B "      ssh-add -L"
     42 .PP
     43 provides any output, it uses that in preference to the identity file.
     44 .PP
     45 If the
     46 .B -i
     47 option is used, or the
     48 .B ssh-add
     49 produced no output, then it uses the contents of the identity
     50 file.  Once it has one or more fingerprints (by whatever means) it
     51 uses ssh to append them to
     52 .B ~/.ssh/authorized_keys
     53 on the remote machine (creating the file, and directory, if necessary.)
     54 
     55 .SH NOTES
     56 This program does not modify the permissions of any
     57 pre-existing files or directories. Therefore, if the remote
     58 .B sshd
     59 has
     60 .B StrictModes
     61 set in its
     62 configuration, then the user's home,
     63 .B ~/.ssh
     64 folder, and
     65 .B ~/.ssh/authorized_keys
     66 file may need to have group writability disabled manually, e.g. via
     67 
     68 .B "      chmod go-w ~ ~/.ssh ~/.ssh/authorized_keys"
     69 
     70 on the remote machine.
     71 
     72 .SH "SEE ALSO"
     73 .BR ssh (1),
     74 .BR ssh-agent (1),
     75 .BR sshd (8)
     76