Secure SSH Access with PKI for Linux Systems Administrators | Exam XK0-004

Achieving Secure SSH Access with PKI for Linux Systems Administrators

Question

A Linux systems administrator is setting up SSH access with PKI for several using their newly created RSA keys.

Which of the following MOST securely achieves this task?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

C.

https://www.linode.com/docs/security/authentication/use-public-key-authentication-with-ssh/

The most secure way to set up SSH access with PKI for several users using their newly created RSA keys is by using the ssh-copy-id command.

Option A, using curl to copy each user's public key file to the respective system, is not recommended as it requires manually copying the keys, which can lead to errors and security issues.

Option B, using cp to copy each user's public key file to the respective system, is also not recommended as it requires manually copying the keys, which can lead to errors and security issues.

Option C, using ssh-copy-id to copy each user's public key file to the respective system, is the recommended approach for securely copying the public key to the remote system. This command automatically appends the public key to the authorized_keys file of the remote system and sets the proper permissions, ensuring a secure and automated process.

Option D, using ssh-copy-id to copy each user's private key file to the respective system, is not recommended as it would expose the private key to potential attackers, compromising the security of the system.

In summary, the recommended and most secure option to set up SSH access with PKI for several users using their newly created RSA keys is to use the ssh-copy-id command to copy each user's public key file to the respective system.