Chapter 5. Integrating Secure Shell
Secure Shell was designed as a replacement for the Berkeley r-protocols. With the exception of key management, it can be used as a simple drop-in replacement. More advanced features that may be appropriate to your environment are also offered.
This chapter discusses integrating Secure Shell into your environment. It covers replacing rsh(1)
with ssh(1)
in scripts, using proxies to bridge disparate networks, limiting privileges with role-based access control (RBAC), and protecting legacy TCP-based applications. After integrating Secure Shell, insecure legacy protocols can be disabled.
Secure Shell Scripts
Automating actions with the Secure Shell client,ssh
(1), is mostly a straightforward replacement of either the ...
Get Secure Shell in the Enterprise now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.