

-A: It is used for disabling the authentication agent connection forwarding procedure.-a: It is used for enabling the authentication agent connection forwarding procedure.-6: It is used for allowing only IPv6 addresses.-4: It is used for allowing only IPv4 addresses.-2: It is used for forcing the ssh command to apply only the SSH-2 protocol.-1: It is used for forcing the ssh command to apply only the SSH-1 protocol.There are various options in the SSH command of Linux.
#Openssh commands password#
The connection would be created not with the password but with the help of an SSH key after copying a public key to a remote host.

To generate the public-private key, we can use the following command:Ī private key should remain hidden at the time the public key should be copied to a remote host. Using an SSH key pair or a public-private key pair for logging into a remote host is more protected than using the passwords. Note: The commands will implement as when they were specified to the host terminal directly after logging into a host computer.
