I am having issues setting up OpenSSH for Windows, using public key authentication.
I have this working on my local desktop and can ssh with a key from Unix machines
Following are setup steps for OpenSSH shipped with Windows 10 v.1803 (April 2018 update. See comments to this post, it might not work with 1809).
Server setup (elevated powershell):
Install OpenSSH server: Add-WindowsCapability -Online -Name OpenSSH.Server~~~~0.0.1.0
.
Start agent and sshd services: Start-Service ssh-agent; Start-Service sshd
(this will generate host keys and default configuration automatically in $env:ProgramData\ssh
).
[Optional] Install OpenSSHUtils powershell module: Install-Module -Force OpenSSHUtils
Client setup (non-elevated powershell):
Generate user key: cd $env:USERPROFILE\.ssh; ssh-keygen.exe
, follow prompts, agree to the default suggested file location. This will create 2 files: id_rsa
and id_rsa.pub
;
[Optional] add key to authentication agent, so you don't have to enter password each time you use it: ssh-add .\id_rsa
(or whatever file was generated);
Server setup continued (non-elevated powershell):
cd $env:USERPROFILE; mkdir .ssh; cd .ssh; New-Item authorized_keys
;id_rsa.pub
file from the client to the .ssh\authorized_keys
file from the previous step.start .
to open explorer with the current folder ($env:USERPROFILE\.ssh
);authorized_keys
, go to Properties -> Security -> Advanced
SYSTEM
and yourself. There must be exactly two permission entries on the file. Some guides suggest running the Repair-AuthorizedKeyPermission $env:USERPROFILE\.ssh\authorized_keys
- this will try to add the sshd
user to the permission list and it will break the authentication, so, don't do that, or at least do not agree on adding the sshd
user). Both SYSTEM
and yourself should have full control over the file.C:\ProgramData\ssh\sshd_config
file. Then restart the sshd
service.
# Match Group administrators
# AuthorizedKeysFile __PROGRAMDATA__/ssh/administrators_authorized_keys
Client:
ssh @
. It should work at this point.Tried that with Windows 10 as server and both itself and a Debian Linux as a client.