From the course: Learning CentOS Linux

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Connecting to the system remotely with Secure Shell (SSH)

Connecting to the system remotely with Secure Shell (SSH)

From the course: Learning CentOS Linux

Start my 1-month free trial

Connecting to the system remotely with Secure Shell (SSH)

- [Instructor] Let's switch over to connecting to the server remotely, using Secure Shell or SSH. SSH sets up an encrypted, secure terminal or command line session between your computer and a remote computer, that's set up as an SSH server. Most of the time, to connect to servers in order to administer them, you'll connect through SSH. There are other management systems and software packages that can provide more automated control. But SSH is one of those fundamental things that any CentOS user or administrator needs to know about. So, we'll take a look at the basics here. If you want to learn more about SSH, take a look at our other Linux Administration Courses that cover in more depth. SSH can use either a username and password or a username and cryptographic key to log in, to authenticate you and allow you access to the system. Connecting with a username and password is a lot easier. But using a key is much more secure. We'll look at both, and we'll start with the basic username…

Contents