WEBVTT

00:01.640 --> 00:07.380
Let's move ahead and start configuring SSX public key authentication.

00:07.760 --> 00:09.490
First, let's see what we need.

00:09.860 --> 00:18.650
We need an client that supports RSA authentication and all the modem SSX clients are good for this.

00:19.290 --> 00:27.590
Then we need the private and public keep bear for each user will generate the least bear in a minute,

00:27.840 --> 00:30.460
both on Windows and Linux.

00:31.130 --> 00:39.230
And if we want to authenticate to networking devices like Cisco, we need an iOS that supports this

00:39.230 --> 00:39.800
feature.

00:39.950 --> 00:45.530
In fact, we need the NSA server or demand that supports public view authentication.

00:47.070 --> 00:55.280
This lecture is recommended if you are using Windows to authenticate to Cisco devices or to Linux servers,

00:55.560 --> 01:03.420
if you are using Linux as the 86 client, you can skip this part and move to generating SSA to keep

01:03.420 --> 01:04.830
bear on Linux.

01:06.440 --> 01:14.990
Put is the most common choice is assessed, each client on Windows Boutique self does not generate the

01:14.990 --> 01:20.630
keeper, but there is another utility called petechiae generator that can do this.

01:22.070 --> 01:27.530
Boutique regenerator is open source and free software, so lets download it.

01:29.460 --> 01:34.410
I'll simply search on Google for a download, put the key generator.

01:40.380 --> 01:43.140
And I'll open this website.

01:46.520 --> 01:54.350
The page contains the download the links for the latest released version of Beauty and Beauty Key Generator,

01:54.680 --> 01:59.480
and I'm searching for Jen Dopp sexy boutique.

01:59.480 --> 02:02.290
Jen, that's sexy, OK?

02:02.600 --> 02:07.550
And I'm downloading Pooty Jen for 60 beat operating systems.

02:12.150 --> 02:16.350
OK, once downloaded, will open the application.

02:18.470 --> 02:20.480
This is pretty key generator.

02:21.980 --> 02:31.070
The type of keys RSA and its length will be of two thousand forty eight, because this is the minimum

02:31.070 --> 02:38.570
recommended size for a key, if you need stronger security, you can choose a key with a length of four

02:38.570 --> 02:41.040
thousand ninety six weeks or more.

02:41.900 --> 02:46.610
This is the main screen of the application and I'll click on Generate.

02:48.610 --> 02:55.900
To generate our random key pooty key generator needs a lot of randomness and I have to continuously

02:55.900 --> 03:01.630
move the mouse over this area for it to be able to generate barkeeper.

03:02.670 --> 03:10.590
And the kids are ready, the next step is to make the comment for the kids and save them somewhere on

03:10.590 --> 03:11.170
the desk.

03:11.730 --> 03:19.500
Don't forget to add the comment because maybe you'll generate more kids and don't want to mix them up.

03:20.980 --> 03:26.380
For example, Windows RSA Key and the current debate.

03:27.770 --> 03:36.200
At the beginning of this section, I've said that the private key can be further secured by encrypting

03:36.200 --> 03:38.040
it with a pass for us.

03:38.570 --> 03:43.520
This is the moment when you can encrypt the private key with a passphrase.

03:44.580 --> 03:46.560
You're right, the path for us here.

03:47.690 --> 03:56.480
In this example, I won't add any for us because I want to keep things simple and don't want to enter

03:56.480 --> 04:00.320
the past for us each time I authenticate to the server.

04:02.190 --> 04:10.590
And I'm saving the phylis, the public, I'm saving it on my desktop, and I'll give it a name.

04:11.840 --> 04:15.920
Like I say, Windows underline, as they say that, Bob.

04:18.420 --> 04:20.670
And I'm saving the private key.

04:22.090 --> 04:24.700
OK, let's say windows.

04:26.030 --> 04:29.600
Privat, that p, p, k.

04:31.110 --> 04:36.570
OK, that's all I've generated the SSA to keep Bear on windows.

04:38.080 --> 04:46.670
Before we can use the keys to authenticate to Cisco, iOS or to Linux, we have to configure them first.

04:47.080 --> 04:54.700
I'll show you how to configure the SFH demon on both Cisco and the Linux in the next Lexus.

04:55.480 --> 04:56.770
See you in a minute.
