June 2025
Beginner to intermediate
473 pages
13h 30m
English
The SSH server knows numerous different authentication methods: The most common one is the password login used so far in this chapter. Alternatives include two-factor authentication (2FA) and SSH authentication with keys, which I will discuss in this section. This type of authentication requires some preparatory work that can be done quickly. As a result, ssh or scp can be used without a password, which is ideal for implementing automation in scripts.
A pair of files serves as the “key.” The public component of the key is stored on the SSH server while the private component remains on the machine where you want to use the ssh, scp, or rsync commands. When establishing an SSH connection, the SSH server can ...
Read now
Unlock full access