Ok.
But assume this rpycService is running on machine A localhost:16000 under
rpycuser, how would that prevent bob who has ssh access to A from
connecting to the service.


2012/6/12 Tomer Filiba <[email protected]>

> $ ssh-keygen -f mykey_rsa
> and then add the public key part (mykey_rsa.pub) to the host
> machine's authorized_keys, under the user you want to connect as.
> for example, if you have a user called rpycuser, go to
> /home/rpycuser/.ssh/authorized_keys and add the generated pubkey.
> then, in the ssh context, pass mykey_rsa as the identity file, and user =
> "rpycuser".
>
>
> -----------------------------------------------------------------
>
> *Tomer Filiba*
> tomerfiliba.com     <http://www.facebook.com/tomerfiliba>    
> <http://il.linkedin.com/in/tomerfiliba>
>
>
>
> On Sun, Jun 10, 2012 at 8:37 PM, Eduard <[email protected]> wrote:
>
>> and you can always just create a distinct id file for the sake of your
>>> service, so not anyway who can access your machine
>>> could access the service.
>>>
>> Out of curiosity. How would one do that?
>>
>
>

Reply via email to