|
|
todo |
|
|
\ No newline at end of file |
|
|
## Overview
|
|
|
|
|
|
Source information: [Set up a SSH access to the cluster on your local system](https://www.pik-potsdam.de/en/institute/about/it-services/hpc/user-guides/access)
|
|
|
|
|
|
The SSH keys serve as a door/key combination, allowing computers possessing the keys (SSH private key) to log into the server where the door (SSH public key) is placed. You can automate the installation of this "door" by following these steps. Note that while the IT advises using a strong passphrase, in practice, leaving this passphrase empty should be secure as long as you refrain from uploading your private key anywhere.
|
|
|
|