The Secure Shell (ssh)

The Secure Shell (ssh) enables users to securely access a remote system over an unsecure network. You’ll use the secure shell to do the following:

  • Log into a remote system (ssh).

  • Copy files over the network between hosts (scp).

  • Run commands on a remote host (sftp).

Before the secure shell was available, remote connections were—and still can be—handled via rlogin, rsh, and rcp. These commands create unsecure connections and are prone to security risks.

With the secure shell, you establish communication between two hosts on an unsecure network. The two hosts are referred to as the client (the host requesting the connection) and the server (the host you are connecting to). The secure shell daemon, sshd, starts up on each ...

Get Inside Solaris™ 9 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.