Configuration Example for SSH login using Public-key Authentication

Last updated on: 2014/10/15
Notice and disclaimer:
At our own initiative, we looked at the SSH login method to a server using public-key authentication from the following platforms. We provide an example setting for each client as well as the setting on the server. The illustrations are intended only for the user’s convenience and do NOT represent any endorsement. We do not provide support for these methods because actual behavior strongly depends on each server or client computer. Please forward any question to your server administrator, the network vendor or the developer/distributor.

Information web site of the supercomputer and seurvice for empryees