Open main menu

CDOT Wiki β

Changes

OPS235 Lab 7 - CentOS7 - HD2

258 bytes added, 16:01, 24 October 2016
no edit summary
|}
=INVESTIGATION 1: INSTALLING, CONFIGURING AND ESTABLISHING MAINTAINING AN SSH CONNECTIONSERVER=
So far, you have learned to use the '''ssh''' utility to establish a secure connection to a remote server to perform tasks, administer the server, etc. For these common operations, you have issued the ''ssh'' command, which is actually the '''client ''' application for ssh. In order to connect to a remote server (like your VMs, Matrix, etc) they need to be running the SSH service(i. e. the ssh daemon). In this labsection, you will learn how to run install and configure an SSH server on an existing VM. You will also learn how to generate private and public keys in a VM, then confirm that you can connect into the server by using the ssh client applicationorder to allow secure connections between your Linux machines (host as well as VMs).
|}
=== Part 2: Establishing a Safe SSH Connection3: Generating Private and Public Keys (Public Key Authentication Infrastructure) ===
As a system administrator, you have the ability to generate or create '''public''' and '''private''' keys to ensure safe and secure ssh connections. This will require a user to prove who they say they are in order to access a Linux server via SSH (i.e. Authentication). The system administer can generate these keys for the first time, or if the system administor administrator suspects that a hacker has compromised or trying to penetrate the server, they can remove the existing keys and generate new keys.
13,420
edits