About 59,600 results
Open links in new tab
  1. Generating a new SSH key and adding it to the ssh-agent

    After you've checked for existing SSH keys, you can generate a new SSH key to use for authentication, then add it to the ssh-agent.

  2. About SSH - GitHub Docs

    Using the SSH protocol, you can connect and authenticate to remote servers and services. With SSH keys, you can connect to GitHub without supplying your username and personal access token at …

  3. Adding a new SSH key to your GitHub account

    You can add an SSH key and use it for authentication, or commit signing, or both. If you want to use the same SSH key for both authentication and signing, you need to upload it twice.

  4. Checking for existing SSH keys - GitHub Docs

    Mar 15, 2022 · Either generate a new SSH key or upload an existing key. If you don't have a supported public and private key pair, or don't wish to use any that are available, generate a new SSH key.

  5. Authorizing an SSH key for use with single sign-on - GitHub Docs

    You can authorize an existing SSH key, or create a new SSH key and then authorize it. For more information about creating a new SSH key, see Generating a new SSH key and adding it to the ssh …

  6. Connecting to GitHub with SSH

    You can connect to GitHub using the Secure Shell Protocol (SSH), which provides a secure channel over an unsecured network.

  7. Using SSH agent forwarding - GitHub Docs

    SSH agent forwarding can be used to make deploying to a server simple. It allows you to use your local SSH keys instead of leaving keys (without passphrases!) sitting on your server.

  8. Error: Permission denied (publickey) - GitHub Docs

    If you see an SSH key you're not familiar with on GitHub, delete it immediately and contact us through the GitHub Support portal for further help. An unidentified public key may indicate a possible security …

  9. Reviewing your SSH keys - GitHub Docs

    To keep your credentials secure, you should regularly audit your SSH keys, deploy keys, and review authorized applications that access your account.

  10. Working with SSH key passphrases - GitHub Docs

    With SSH keys, if someone gains access to your computer, the attacker can gain access to every system that uses that key. To add an extra layer of security, you can add a passphrase to your SSH …