SSH to droplet with non root userSSH doesn't ask for password, gives “permission denied” immediatelySSH keys fail for one userChanging copssh default FTP root breaks RSA authenticationAWS Amazon EC2 - password-less SSH login for non-root users using PEM keypairsVMware ESXi 4.1: how to create a new user with root permissionsChrooted user can't login with SSHOne-liner to create UNIX user, add in SSH key, disable root over SSHcan' t access ec2 instance for additional user with sftp or ssh - key refusedCreating a new user with SSH access on ec2Ubuntu 16.04 - Login not working in external SSH Clients

What's the meaning of "Sollensaussagen"?

How seriously should I take size and weight limits of hand luggage?

What Exploit Are These User Agents Trying to Use?

Rotate ASCII Art by 45 Degrees

Send out email when Apex Queueable fails and test it

Is there a hemisphere-neutral way of specifying a season?

How to travel to Japan while expressing milk?

How to install cross-compiler on Ubuntu 18.04?

What is a Samsaran Word™?

Why was Sir Cadogan fired?

Is it possible to map the firing of neurons in the human brain so as to stimulate artificial memories in someone else?

What do you call someone who asks many questions?

Knowledge-based authentication using Domain-driven Design in C#

How does a dynamic QR code work?

Are British MPs missing the point, with these 'Indicative Votes'?

How to coordinate airplane tickets?

How to compactly explain secondary and tertiary characters without resorting to stereotypes?

Is this draw by repetition?

Is it possible to create a QR code using text?

Finitely generated matrix groups whose eigenvalues are all algebraic

Is it a bad idea to plug the other end of ESD strap to wall ground?

How do I exit BASH while loop using modulus operator?

Could neural networks be considered metaheuristics?

Did 'Cinema Songs' exist during Hiranyakshipu's time?



SSH to droplet with non root user


SSH doesn't ask for password, gives “permission denied” immediatelySSH keys fail for one userChanging copssh default FTP root breaks RSA authenticationAWS Amazon EC2 - password-less SSH login for non-root users using PEM keypairsVMware ESXi 4.1: how to create a new user with root permissionsChrooted user can't login with SSHOne-liner to create UNIX user, add in SSH key, disable root over SSHcan' t access ec2 instance for additional user with sftp or ssh - key refusedCreating a new user with SSH access on ec2Ubuntu 16.04 - Login not working in external SSH Clients













1















I recently made some new users in my digitalocean droplet, and I would like to access them directly with the command ssh username@ip. However, I get denied with username@ip: Permission denied (publickey). For clarification, the machine has the correct private-key and can access the droplet with ssh root@ip



I did the following to create the new user



root@school:~# adduser username
Adding user `username' ...
Adding new group `username' (1001) ...
Adding new user `username' (1001) with group `username' ...
Creating home directory `/home/username' ...
Copying files from `/etc/skel' ...
Enter new UNIX password:
Retype new UNIX password:
passwd: password updated successfully


After these steps, what is further to do to be able to access the droplet with ssh username@ip ?










share|improve this question






















  • if available you could use the tool ssh-copy-id username@ip to copy the PUBLIC key to the authorized_key file from the user on the server

    – Dennis Nolte
    Mar 20 at 16:44















1















I recently made some new users in my digitalocean droplet, and I would like to access them directly with the command ssh username@ip. However, I get denied with username@ip: Permission denied (publickey). For clarification, the machine has the correct private-key and can access the droplet with ssh root@ip



I did the following to create the new user



root@school:~# adduser username
Adding user `username' ...
Adding new group `username' (1001) ...
Adding new user `username' (1001) with group `username' ...
Creating home directory `/home/username' ...
Copying files from `/etc/skel' ...
Enter new UNIX password:
Retype new UNIX password:
passwd: password updated successfully


After these steps, what is further to do to be able to access the droplet with ssh username@ip ?










share|improve this question






















  • if available you could use the tool ssh-copy-id username@ip to copy the PUBLIC key to the authorized_key file from the user on the server

    – Dennis Nolte
    Mar 20 at 16:44













1












1








1








I recently made some new users in my digitalocean droplet, and I would like to access them directly with the command ssh username@ip. However, I get denied with username@ip: Permission denied (publickey). For clarification, the machine has the correct private-key and can access the droplet with ssh root@ip



I did the following to create the new user



root@school:~# adduser username
Adding user `username' ...
Adding new group `username' (1001) ...
Adding new user `username' (1001) with group `username' ...
Creating home directory `/home/username' ...
Copying files from `/etc/skel' ...
Enter new UNIX password:
Retype new UNIX password:
passwd: password updated successfully


After these steps, what is further to do to be able to access the droplet with ssh username@ip ?










share|improve this question














I recently made some new users in my digitalocean droplet, and I would like to access them directly with the command ssh username@ip. However, I get denied with username@ip: Permission denied (publickey). For clarification, the machine has the correct private-key and can access the droplet with ssh root@ip



I did the following to create the new user



root@school:~# adduser username
Adding user `username' ...
Adding new group `username' (1001) ...
Adding new user `username' (1001) with group `username' ...
Creating home directory `/home/username' ...
Copying files from `/etc/skel' ...
Enter new UNIX password:
Retype new UNIX password:
passwd: password updated successfully


After these steps, what is further to do to be able to access the droplet with ssh username@ip ?







ssh






share|improve this question













share|improve this question











share|improve this question




share|improve this question










asked Mar 20 at 13:08









Jonas GrønbekJonas Grønbek

1084




1084












  • if available you could use the tool ssh-copy-id username@ip to copy the PUBLIC key to the authorized_key file from the user on the server

    – Dennis Nolte
    Mar 20 at 16:44

















  • if available you could use the tool ssh-copy-id username@ip to copy the PUBLIC key to the authorized_key file from the user on the server

    – Dennis Nolte
    Mar 20 at 16:44
















if available you could use the tool ssh-copy-id username@ip to copy the PUBLIC key to the authorized_key file from the user on the server

– Dennis Nolte
Mar 20 at 16:44





if available you could use the tool ssh-copy-id username@ip to copy the PUBLIC key to the authorized_key file from the user on the server

– Dennis Nolte
Mar 20 at 16:44










1 Answer
1






active

oldest

votes


















5















"the machine has the correct private-key"




That is the root cause of your misunderstanding. Access is controlled separately for each account, not for the machine as a whole.



For each account you want to access with a particular key you will need to append the associated public key to the file ~/.ssh/authorized_keys in the home directory of that account.



Or in other words: copy /root/.ssh/authorized_keys to /home/username/.ssh/authorized_keys and ensure the correct ownership and permissions on those files/directories.






share|improve this answer


















  • 1





    while true please note that you will copy the PUBLIC key, not the private key into the authorized_keys. Additionally copy might just overwrite and give too much access so be catious when doing a copy.

    – Dennis Nolte
    Mar 20 at 16:44











  • It would be simpler using the ssh-copy-id tool: ssh-copy-id user@remote-host

    – JucaPirama
    Mar 21 at 14:21












  • @JucaPirama ssh-copy-id user@remote-host leaves you in a bit of a catch-22 when your SSHD configuration does not allow password authentication (which is quite strongly recommended).

    – HBruijn
    Mar 21 at 14:30











Your Answer








StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "2"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);

else
createEditor();

);

function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);



);













draft saved

draft discarded


















StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f959119%2fssh-to-droplet-with-non-root-user%23new-answer', 'question_page');

);

Post as a guest















Required, but never shown

























1 Answer
1






active

oldest

votes








1 Answer
1






active

oldest

votes









active

oldest

votes






active

oldest

votes









5















"the machine has the correct private-key"




That is the root cause of your misunderstanding. Access is controlled separately for each account, not for the machine as a whole.



For each account you want to access with a particular key you will need to append the associated public key to the file ~/.ssh/authorized_keys in the home directory of that account.



Or in other words: copy /root/.ssh/authorized_keys to /home/username/.ssh/authorized_keys and ensure the correct ownership and permissions on those files/directories.






share|improve this answer


















  • 1





    while true please note that you will copy the PUBLIC key, not the private key into the authorized_keys. Additionally copy might just overwrite and give too much access so be catious when doing a copy.

    – Dennis Nolte
    Mar 20 at 16:44











  • It would be simpler using the ssh-copy-id tool: ssh-copy-id user@remote-host

    – JucaPirama
    Mar 21 at 14:21












  • @JucaPirama ssh-copy-id user@remote-host leaves you in a bit of a catch-22 when your SSHD configuration does not allow password authentication (which is quite strongly recommended).

    – HBruijn
    Mar 21 at 14:30















5















"the machine has the correct private-key"




That is the root cause of your misunderstanding. Access is controlled separately for each account, not for the machine as a whole.



For each account you want to access with a particular key you will need to append the associated public key to the file ~/.ssh/authorized_keys in the home directory of that account.



Or in other words: copy /root/.ssh/authorized_keys to /home/username/.ssh/authorized_keys and ensure the correct ownership and permissions on those files/directories.






share|improve this answer


















  • 1





    while true please note that you will copy the PUBLIC key, not the private key into the authorized_keys. Additionally copy might just overwrite and give too much access so be catious when doing a copy.

    – Dennis Nolte
    Mar 20 at 16:44











  • It would be simpler using the ssh-copy-id tool: ssh-copy-id user@remote-host

    – JucaPirama
    Mar 21 at 14:21












  • @JucaPirama ssh-copy-id user@remote-host leaves you in a bit of a catch-22 when your SSHD configuration does not allow password authentication (which is quite strongly recommended).

    – HBruijn
    Mar 21 at 14:30













5












5








5








"the machine has the correct private-key"




That is the root cause of your misunderstanding. Access is controlled separately for each account, not for the machine as a whole.



For each account you want to access with a particular key you will need to append the associated public key to the file ~/.ssh/authorized_keys in the home directory of that account.



Or in other words: copy /root/.ssh/authorized_keys to /home/username/.ssh/authorized_keys and ensure the correct ownership and permissions on those files/directories.






share|improve this answer














"the machine has the correct private-key"




That is the root cause of your misunderstanding. Access is controlled separately for each account, not for the machine as a whole.



For each account you want to access with a particular key you will need to append the associated public key to the file ~/.ssh/authorized_keys in the home directory of that account.



Or in other words: copy /root/.ssh/authorized_keys to /home/username/.ssh/authorized_keys and ensure the correct ownership and permissions on those files/directories.







share|improve this answer












share|improve this answer



share|improve this answer










answered Mar 20 at 13:20









HBruijnHBruijn

55.9k1190150




55.9k1190150







  • 1





    while true please note that you will copy the PUBLIC key, not the private key into the authorized_keys. Additionally copy might just overwrite and give too much access so be catious when doing a copy.

    – Dennis Nolte
    Mar 20 at 16:44











  • It would be simpler using the ssh-copy-id tool: ssh-copy-id user@remote-host

    – JucaPirama
    Mar 21 at 14:21












  • @JucaPirama ssh-copy-id user@remote-host leaves you in a bit of a catch-22 when your SSHD configuration does not allow password authentication (which is quite strongly recommended).

    – HBruijn
    Mar 21 at 14:30












  • 1





    while true please note that you will copy the PUBLIC key, not the private key into the authorized_keys. Additionally copy might just overwrite and give too much access so be catious when doing a copy.

    – Dennis Nolte
    Mar 20 at 16:44











  • It would be simpler using the ssh-copy-id tool: ssh-copy-id user@remote-host

    – JucaPirama
    Mar 21 at 14:21












  • @JucaPirama ssh-copy-id user@remote-host leaves you in a bit of a catch-22 when your SSHD configuration does not allow password authentication (which is quite strongly recommended).

    – HBruijn
    Mar 21 at 14:30







1




1





while true please note that you will copy the PUBLIC key, not the private key into the authorized_keys. Additionally copy might just overwrite and give too much access so be catious when doing a copy.

– Dennis Nolte
Mar 20 at 16:44





while true please note that you will copy the PUBLIC key, not the private key into the authorized_keys. Additionally copy might just overwrite and give too much access so be catious when doing a copy.

– Dennis Nolte
Mar 20 at 16:44













It would be simpler using the ssh-copy-id tool: ssh-copy-id user@remote-host

– JucaPirama
Mar 21 at 14:21






It would be simpler using the ssh-copy-id tool: ssh-copy-id user@remote-host

– JucaPirama
Mar 21 at 14:21














@JucaPirama ssh-copy-id user@remote-host leaves you in a bit of a catch-22 when your SSHD configuration does not allow password authentication (which is quite strongly recommended).

– HBruijn
Mar 21 at 14:30





@JucaPirama ssh-copy-id user@remote-host leaves you in a bit of a catch-22 when your SSHD configuration does not allow password authentication (which is quite strongly recommended).

– HBruijn
Mar 21 at 14:30

















draft saved

draft discarded
















































Thanks for contributing an answer to Server Fault!


  • Please be sure to answer the question. Provide details and share your research!

But avoid


  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.

To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f959119%2fssh-to-droplet-with-non-root-user%23new-answer', 'question_page');

);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







Popular posts from this blog

Moe incest case Sentencing See also References Navigation menu"'Australian Josef Fritzl' fathered four children by daughter""Small town recoils in horror at 'Australian Fritzl' incest case""Victorian rape allegations echo Fritzl case - Just In (Australian Broadcasting Corporation)""Incest father jailed for 22 years""'Australian Fritzl' sentenced to 22 years in prison for abusing daughter for three decades""RSJ v The Queen"

John Burke, 9th Earl of Clanricarde References Navigation menuA General and heraldic dictionary of the peerage and baronetage of the British EmpireLeigh Rayment's Peerage Pages

Football at the 1986 Brunei Merdeka Games Contents Teams Group stage Knockout stage References Navigation menu"Brunei Merdeka Games 1986".