Chapter 20. Configuring SSH

Image

The following topics are covered in this chapter:

The following RHCSA exam objective is covered in this chapter:

  • Configure key-based authentication for SSH

Secure Shell (SSH) is among the most important utilities that system administrators use. In Chapter 5, “Connecting to Red Hat Enterprise Linux 8,” you learned how to use SSH to connect to a server using a password or key-based authentication. In this chapter, you learn about some of the more advanced configuration settings.

“Do I Know This Already?” ...

Get Red Hat RHCSA 8 Cert Guide: EX200 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.