Skip to Content
CentOS 8 Essentials
book

CentOS 8 Essentials

by Neil Smyth
May 2020
Beginner
261 pages
6h 32m
English
Packt Publishing
Content preview from CentOS 8 Essentials

14. Configuring SSH Key-based Authentication on CentOS 8

When a CentOS 8 system is first installed, it is configured by default to allow remote command-line access via Secure Shell (SSH) connections. This provides password protected and encrypted access to the system for the root account and any other users added during the installation phase. This level of security is far from adequate and should be upgraded to SSH key-based authentication as soon as possible.

This chapter will outline the steps to increase the security of a CentOS 8 system by implementing key-based SSH authentication.

14.1 An Overview of Secure Shell (SSH)

SSH is designed to allow secure remote access to systems for the purposes of gaining shell access and transferring files ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

CentOS 7 Linux Server Cookbook - Second Edition

CentOS 7 Linux Server Cookbook - Second Edition

Jonathan Hobson
Mastering CentOS 7 Linux Server

Mastering CentOS 7 Linux Server

Mohamed Alibi, BHASKARJYOTI ROY

Publisher Resources

ISBN: 9781800561830