Secure Shell

SSH provides secure remote access and is foundational to Unix administration.

Key practices

  • Use key-based authentication.
  • Set PermitRootLogin no.
  • Rotate keys and audit authorized keys.

Common workflow

bash
ssh -i ~/.ssh/ops_ed25519 user@server
ssh-keygen -t ed25519 -C "ops@unix-docs"