Bookmark this page

Summary

  • With the ssh command, users can access remote systems securely with the SSH protocol.

  • A client system stores the identities of remote servers in the ~/.ssh/known_hosts and /etc/ssh/ssh_known_hosts files.

  • SSH supports both password-based and key-based authentication.

  • The ssh-keygen command generates an SSH key pair for authentication. The ssh-copy-id command exports the public key to remote systems.

  • The sshd service implements the SSH protocol on Red Hat Enterprise Linux systems.

  • Configure advanced SSH settings in the /etc/ssh/sshd_config configuration file.

  • It is a recommended practice to configure sshd to disable remote logins as root and to require public key authentication rather than password-based authentication.

Revision: rh124-9.3-770cc61