Step | Screenshot |
---|---|
1. Navigate to the openssl folder. cd C:\Work\openssl\bin | |
2. Execute this command:openssl.exe rsa -in "C:\Work\SDK\tools\testvm.key" -out testvm.pem | |
3. The command will prompt for passphrase. Enter the passphrase that you gave to encrypt the key previously. Note: You will now have a file named testvm.pem under the bin folder. | |
4. Navigate to the C:\Work\putty folder and double click on puttygen.exe. | |
5. Click on Conversions and then on Import key. | |
6. Select the C:\Work\openssl\bin\testvm.pem file and then click Open. | |
7. Enter the Key passphrase to encrypt the key. Confirm the passphrase and click on “Save private key”. | |
9. Save the private key in the following location “C:\Work\openssl\bin” and save the file as testvm.ppk. |
Step | Screenshot |
---|---|
1. Double click on “putty.exe” under C:\Work\putty | |
2.Provide the following details:Hostname: root@localhost Port: The port number that is generated for you. | |
3. Double click on "Auth" under “SSH”. | |
4. Select the file testvm.ppk from “C:\Work\openssl\bin\testvm.ppk” | |
5. Click on “Session” and "Open". 6. Press “Yes” when the prompt asks to proceed. | |
7. Provide the passphrase that you gave to encrypt the key previously and press Enter. | |
8. You are logged in to the VM as root user. |
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
User | Count |
---|---|
13 | |
10 | |
10 | |
7 | |
6 | |
5 | |
5 | |
5 | |
5 | |
4 |