SSH to droplet with non root userSSH doesn't ask for password, gives “permission denied” immediatelySSH keys fail for one userChanging copssh default FTP root breaks RSA authenticationAWS Amazon EC2 - password-less SSH login for non-root users using PEM keypairsVMware ESXi 4.1: how to create a new user with root permissionsChrooted user can't login with SSHOne-liner to create UNIX user, add in SSH key, disable root over SSHcan' t access ec2 instance for additional user with sftp or ssh - key refusedCreating a new user with SSH access on ec2Ubuntu 16.04 - Login not working in external SSH Clients

What's the meaning of "Sollensaussagen"?

How seriously should I take size and weight limits of hand luggage?

What Exploit Are These User Agents Trying to Use?

Rotate ASCII Art by 45 Degrees

Send out email when Apex Queueable fails and test it

Is there a hemisphere-neutral way of specifying a season?

How to travel to Japan while expressing milk?

How to install cross-compiler on Ubuntu 18.04?

What is a Samsaran Word™?

Why was Sir Cadogan fired?

Is it possible to map the firing of neurons in the human brain so as to stimulate artificial memories in someone else?

What do you call someone who asks many questions?

Knowledge-based authentication using Domain-driven Design in C#

How does a dynamic QR code work?

Are British MPs missing the point, with these 'Indicative Votes'?

How to coordinate airplane tickets?

How to compactly explain secondary and tertiary characters without resorting to stereotypes?

Is this draw by repetition?

Is it possible to create a QR code using text?

Finitely generated matrix groups whose eigenvalues are all algebraic

Is it a bad idea to plug the other end of ESD strap to wall ground?

How do I exit BASH while loop using modulus operator?

Could neural networks be considered metaheuristics?

Did 'Cinema Songs' exist during Hiranyakshipu's time?



SSH to droplet with non root user


SSH doesn't ask for password, gives “permission denied” immediatelySSH keys fail for one userChanging copssh default FTP root breaks RSA authenticationAWS Amazon EC2 - password-less SSH login for non-root users using PEM keypairsVMware ESXi 4.1: how to create a new user with root permissionsChrooted user can't login with SSHOne-liner to create UNIX user, add in SSH key, disable root over SSHcan' t access ec2 instance for additional user with sftp or ssh - key refusedCreating a new user with SSH access on ec2Ubuntu 16.04 - Login not working in external SSH Clients













1















I recently made some new users in my digitalocean droplet, and I would like to access them directly with the command ssh username@ip. However, I get denied with username@ip: Permission denied (publickey). For clarification, the machine has the correct private-key and can access the droplet with ssh root@ip



I did the following to create the new user



root@school:~# adduser username
Adding user `username' ...
Adding new group `username' (1001) ...
Adding new user `username' (1001) with group `username' ...
Creating home directory `/home/username' ...
Copying files from `/etc/skel' ...
Enter new UNIX password:
Retype new UNIX password:
passwd: password updated successfully


After these steps, what is further to do to be able to access the droplet with ssh username@ip ?










share|improve this question






















  • if available you could use the tool ssh-copy-id username@ip to copy the PUBLIC key to the authorized_key file from the user on the server

    – Dennis Nolte
    Mar 20 at 16:44















1















I recently made some new users in my digitalocean droplet, and I would like to access them directly with the command ssh username@ip. However, I get denied with username@ip: Permission denied (publickey). For clarification, the machine has the correct private-key and can access the droplet with ssh root@ip



I did the following to create the new user



root@school:~# adduser username
Adding user `username' ...
Adding new group `username' (1001) ...
Adding new user `username' (1001) with group `username' ...
Creating home directory `/home/username' ...
Copying files from `/etc/skel' ...
Enter new UNIX password:
Retype new UNIX password:
passwd: password updated successfully


After these steps, what is further to do to be able to access the droplet with ssh username@ip ?










share|improve this question






















  • if available you could use the tool ssh-copy-id username@ip to copy the PUBLIC key to the authorized_key file from the user on the server

    – Dennis Nolte
    Mar 20 at 16:44













1












1








1








I recently made some new users in my digitalocean droplet, and I would like to access them directly with the command ssh username@ip. However, I get denied with username@ip: Permission denied (publickey). For clarification, the machine has the correct private-key and can access the droplet with ssh root@ip



I did the following to create the new user



root@school:~# adduser username
Adding user `username' ...
Adding new group `username' (1001) ...
Adding new user `username' (1001) with group `username' ...
Creating home directory `/home/username' ...
Copying files from `/etc/skel' ...
Enter new UNIX password:
Retype new UNIX password:
passwd: password updated successfully


After these steps, what is further to do to be able to access the droplet with ssh username@ip ?










share|improve this question














I recently made some new users in my digitalocean droplet, and I would like to access them directly with the command ssh username@ip. However, I get denied with username@ip: Permission denied (publickey). For clarification, the machine has the correct private-key and can access the droplet with ssh root@ip



I did the following to create the new user



root@school:~# adduser username
Adding user `username' ...
Adding new group `username' (1001) ...
Adding new user `username' (1001) with group `username' ...
Creating home directory `/home/username' ...
Copying files from `/etc/skel' ...
Enter new UNIX password:
Retype new UNIX password:
passwd: password updated successfully


After these steps, what is further to do to be able to access the droplet with ssh username@ip ?







ssh






share|improve this question













share|improve this question











share|improve this question




share|improve this question










asked Mar 20 at 13:08









Jonas GrønbekJonas Grønbek

1084




1084












  • if available you could use the tool ssh-copy-id username@ip to copy the PUBLIC key to the authorized_key file from the user on the server

    – Dennis Nolte
    Mar 20 at 16:44

















  • if available you could use the tool ssh-copy-id username@ip to copy the PUBLIC key to the authorized_key file from the user on the server

    – Dennis Nolte
    Mar 20 at 16:44
















if available you could use the tool ssh-copy-id username@ip to copy the PUBLIC key to the authorized_key file from the user on the server

– Dennis Nolte
Mar 20 at 16:44





if available you could use the tool ssh-copy-id username@ip to copy the PUBLIC key to the authorized_key file from the user on the server

– Dennis Nolte
Mar 20 at 16:44










1 Answer
1






active

oldest

votes


















5















"the machine has the correct private-key"




That is the root cause of your misunderstanding. Access is controlled separately for each account, not for the machine as a whole.



For each account you want to access with a particular key you will need to append the associated public key to the file ~/.ssh/authorized_keys in the home directory of that account.



Or in other words: copy /root/.ssh/authorized_keys to /home/username/.ssh/authorized_keys and ensure the correct ownership and permissions on those files/directories.






share|improve this answer


















  • 1





    while true please note that you will copy the PUBLIC key, not the private key into the authorized_keys. Additionally copy might just overwrite and give too much access so be catious when doing a copy.

    – Dennis Nolte
    Mar 20 at 16:44











  • It would be simpler using the ssh-copy-id tool: ssh-copy-id user@remote-host

    – JucaPirama
    Mar 21 at 14:21












  • @JucaPirama ssh-copy-id user@remote-host leaves you in a bit of a catch-22 when your SSHD configuration does not allow password authentication (which is quite strongly recommended).

    – HBruijn
    Mar 21 at 14:30











Your Answer








StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "2"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);

else
createEditor();

);

function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);



);













draft saved

draft discarded


















StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f959119%2fssh-to-droplet-with-non-root-user%23new-answer', 'question_page');

);

Post as a guest















Required, but never shown

























1 Answer
1






active

oldest

votes








1 Answer
1






active

oldest

votes









active

oldest

votes






active

oldest

votes









5















"the machine has the correct private-key"




That is the root cause of your misunderstanding. Access is controlled separately for each account, not for the machine as a whole.



For each account you want to access with a particular key you will need to append the associated public key to the file ~/.ssh/authorized_keys in the home directory of that account.



Or in other words: copy /root/.ssh/authorized_keys to /home/username/.ssh/authorized_keys and ensure the correct ownership and permissions on those files/directories.






share|improve this answer


















  • 1





    while true please note that you will copy the PUBLIC key, not the private key into the authorized_keys. Additionally copy might just overwrite and give too much access so be catious when doing a copy.

    – Dennis Nolte
    Mar 20 at 16:44











  • It would be simpler using the ssh-copy-id tool: ssh-copy-id user@remote-host

    – JucaPirama
    Mar 21 at 14:21












  • @JucaPirama ssh-copy-id user@remote-host leaves you in a bit of a catch-22 when your SSHD configuration does not allow password authentication (which is quite strongly recommended).

    – HBruijn
    Mar 21 at 14:30















5















"the machine has the correct private-key"




That is the root cause of your misunderstanding. Access is controlled separately for each account, not for the machine as a whole.



For each account you want to access with a particular key you will need to append the associated public key to the file ~/.ssh/authorized_keys in the home directory of that account.



Or in other words: copy /root/.ssh/authorized_keys to /home/username/.ssh/authorized_keys and ensure the correct ownership and permissions on those files/directories.






share|improve this answer


















  • 1





    while true please note that you will copy the PUBLIC key, not the private key into the authorized_keys. Additionally copy might just overwrite and give too much access so be catious when doing a copy.

    – Dennis Nolte
    Mar 20 at 16:44











  • It would be simpler using the ssh-copy-id tool: ssh-copy-id user@remote-host

    – JucaPirama
    Mar 21 at 14:21












  • @JucaPirama ssh-copy-id user@remote-host leaves you in a bit of a catch-22 when your SSHD configuration does not allow password authentication (which is quite strongly recommended).

    – HBruijn
    Mar 21 at 14:30













5












5








5








"the machine has the correct private-key"




That is the root cause of your misunderstanding. Access is controlled separately for each account, not for the machine as a whole.



For each account you want to access with a particular key you will need to append the associated public key to the file ~/.ssh/authorized_keys in the home directory of that account.



Or in other words: copy /root/.ssh/authorized_keys to /home/username/.ssh/authorized_keys and ensure the correct ownership and permissions on those files/directories.






share|improve this answer














"the machine has the correct private-key"




That is the root cause of your misunderstanding. Access is controlled separately for each account, not for the machine as a whole.



For each account you want to access with a particular key you will need to append the associated public key to the file ~/.ssh/authorized_keys in the home directory of that account.



Or in other words: copy /root/.ssh/authorized_keys to /home/username/.ssh/authorized_keys and ensure the correct ownership and permissions on those files/directories.







share|improve this answer












share|improve this answer



share|improve this answer










answered Mar 20 at 13:20









HBruijnHBruijn

55.9k1190150




55.9k1190150







  • 1





    while true please note that you will copy the PUBLIC key, not the private key into the authorized_keys. Additionally copy might just overwrite and give too much access so be catious when doing a copy.

    – Dennis Nolte
    Mar 20 at 16:44











  • It would be simpler using the ssh-copy-id tool: ssh-copy-id user@remote-host

    – JucaPirama
    Mar 21 at 14:21












  • @JucaPirama ssh-copy-id user@remote-host leaves you in a bit of a catch-22 when your SSHD configuration does not allow password authentication (which is quite strongly recommended).

    – HBruijn
    Mar 21 at 14:30












  • 1





    while true please note that you will copy the PUBLIC key, not the private key into the authorized_keys. Additionally copy might just overwrite and give too much access so be catious when doing a copy.

    – Dennis Nolte
    Mar 20 at 16:44











  • It would be simpler using the ssh-copy-id tool: ssh-copy-id user@remote-host

    – JucaPirama
    Mar 21 at 14:21












  • @JucaPirama ssh-copy-id user@remote-host leaves you in a bit of a catch-22 when your SSHD configuration does not allow password authentication (which is quite strongly recommended).

    – HBruijn
    Mar 21 at 14:30







1




1





while true please note that you will copy the PUBLIC key, not the private key into the authorized_keys. Additionally copy might just overwrite and give too much access so be catious when doing a copy.

– Dennis Nolte
Mar 20 at 16:44





while true please note that you will copy the PUBLIC key, not the private key into the authorized_keys. Additionally copy might just overwrite and give too much access so be catious when doing a copy.

– Dennis Nolte
Mar 20 at 16:44













It would be simpler using the ssh-copy-id tool: ssh-copy-id user@remote-host

– JucaPirama
Mar 21 at 14:21






It would be simpler using the ssh-copy-id tool: ssh-copy-id user@remote-host

– JucaPirama
Mar 21 at 14:21














@JucaPirama ssh-copy-id user@remote-host leaves you in a bit of a catch-22 when your SSHD configuration does not allow password authentication (which is quite strongly recommended).

– HBruijn
Mar 21 at 14:30





@JucaPirama ssh-copy-id user@remote-host leaves you in a bit of a catch-22 when your SSHD configuration does not allow password authentication (which is quite strongly recommended).

– HBruijn
Mar 21 at 14:30

















draft saved

draft discarded
















































Thanks for contributing an answer to Server Fault!


  • Please be sure to answer the question. Provide details and share your research!

But avoid


  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.

To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f959119%2fssh-to-droplet-with-non-root-user%23new-answer', 'question_page');

);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







Popular posts from this blog

Solar Wings Breeze Design and development Specifications (Breeze) References Navigation menu1368-485X"Hang glider: Breeze (Solar Wings)"e

Kathakali Contents Etymology and nomenclature History Repertoire Songs and musical instruments Traditional plays Styles: Sampradayam Training centers and awards Relationship to other dance forms See also Notes References External links Navigation menueThe Illustrated Encyclopedia of Hinduism: A-MSouth Asian Folklore: An EncyclopediaRoutledge International Encyclopedia of Women: Global Women's Issues and KnowledgeKathakali Dance-drama: Where Gods and Demons Come to PlayKathakali Dance-drama: Where Gods and Demons Come to PlayKathakali Dance-drama: Where Gods and Demons Come to Play10.1353/atj.2005.0004The Illustrated Encyclopedia of Hinduism: A-MEncyclopedia of HinduismKathakali Dance-drama: Where Gods and Demons Come to PlaySonic Liturgy: Ritual and Music in Hindu Tradition"The Mirror of Gesture"Kathakali Dance-drama: Where Gods and Demons Come to Play"Kathakali"Indian Theatre: Traditions of PerformanceIndian Theatre: Traditions of PerformanceIndian Theatre: Traditions of PerformanceIndian Theatre: Traditions of PerformanceMedieval Indian Literature: An AnthologyThe Oxford Companion to Indian TheatreSouth Asian Folklore: An Encyclopedia : Afghanistan, Bangladesh, India, Nepal, Pakistan, Sri LankaThe Rise of Performance Studies: Rethinking Richard Schechner's Broad SpectrumIndian Theatre: Traditions of PerformanceModern Asian Theatre and Performance 1900-2000Critical Theory and PerformanceBetween Theater and AnthropologyKathakali603847011Indian Theatre: Traditions of PerformanceIndian Theatre: Traditions of PerformanceIndian Theatre: Traditions of PerformanceBetween Theater and AnthropologyBetween Theater and AnthropologyNambeesan Smaraka AwardsArchivedThe Cambridge Guide to TheatreRoutledge International Encyclopedia of Women: Global Women's Issues and KnowledgeThe Garland Encyclopedia of World Music: South Asia : the Indian subcontinentThe Ethos of Noh: Actors and Their Art10.2307/1145740By Means of Performance: Intercultural Studies of Theatre and Ritual10.1017/s204912550000100xReconceiving the Renaissance: A Critical ReaderPerformance TheoryListening to Theatre: The Aural Dimension of Beijing Opera10.2307/1146013Kathakali: The Art of the Non-WorldlyOn KathakaliKathakali, the dance theatreThe Kathakali Complex: Performance & StructureKathakali Dance-Drama: Where Gods and Demons Come to Play10.1093/obo/9780195399318-0071Drama and Ritual of Early Hinduism"In the Shadow of Hollywood Orientalism: Authentic East Indian Dancing"10.1080/08949460490274013Sanskrit Play Production in Ancient IndiaIndian Music: History and StructureBharata, the Nāṭyaśāstra233639306Table of Contents2238067286469807Dance In Indian Painting10.2307/32047833204783Kathakali Dance-Theatre: A Visual Narrative of Sacred Indian MimeIndian Classical Dance: The Renaissance and BeyondKathakali: an indigenous art-form of Keralaeee

Method to test if a number is a perfect power? Announcing the arrival of Valued Associate #679: Cesar Manara Planned maintenance scheduled April 23, 2019 at 00:00UTC (8:00pm US/Eastern)Detecting perfect squares faster than by extracting square rooteffective way to get the integer sequence A181392 from oeisA rarely mentioned fact about perfect powersHow many numbers such $n$ are there that $n<100,lfloorsqrtn rfloor mid n$Check perfect squareness by modulo division against multiple basesFor what pair of integers $(a,b)$ is $3^a + 7^b$ a perfect square.Do there exist any positive integers $n$ such that $lfloore^nrfloor$ is a perfect power? What is the probability that one exists?finding perfect power factors of an integerProve that the sequence contains a perfect square for any natural number $m $ in the domain of $f$ .Counting Perfect Powers