0:00 Theory behind the SSH technology
10:58 Setup Public Key Authentication for SSH
If you are working as a system admin, it's very likely that you are going to use #SSH if not already using it to remotely login #Linux servers. If you are still using password based authentication method, it's time to change it to key-based authentication method which gives you more secure and robust way of accessing servers which is backed by the strength of public key #cryptography. With the increase in number of cyber attacks, you should avoid using username and password to login to your severs as much as possible.
In this video, I am going to walk you through all the necessary steps to disable the password based authentication and configure SSH server and the client for the key-based authentication method, also known as public key authentication method. In the first half of the video, I will talk about the cryptography theory behind the SSH technology and in the second half, I am going to show you the configuration part for the server and the client machine.
Watch video 009 - How Does SSH Work | How To Setup SSH Server And Client For A Key-Based Authentication online without registration, duration hours minute second in high quality. This video was added by user CommandLine 10 April 2021, don't forget to share it with your friends and acquaintances, it has been viewed on our site 12,650 once and liked it 64 people.