Chapter 5. Remote Authentication

In this chapter, we will discuss the following topics:

  • Remote server/host access using SSH
  • Disabling or enabling SSH root login
  • Restricting remote access with key-based login into SSH
  • Copying files remotely
  • Setting up a Kerberos server with Ubuntu

Remote server/host access using SSH

SSH, or Secure Shell, is a protocol which is used to log on to remote systems securely and is the most commonly used method for accessing remote Linux systems.

Getting ready

To see how to use SSH, we need two Ubuntu systems. One will be used as a server and the other as a client.

How to do it…

To use SSH, we can use freely available software called OpenSSH. Once the software is installed, it can be used by the command ssh on the Linux system. ...

Get Practical Linux Security Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.