Tagged articles
2 articles
Page 1 of 1
Open Source Tech Hub
Open Source Tech Hub
Jan 22, 2021 · Information Security

How to Secure SSH Access with Certificate‑Based Authentication

This guide explains how to set up SSH certificate‑based authentication by creating a Certificate Authority, generating user and host keys, signing certificates, configuring both server and client to trust them, and managing revocation, offering a more secure alternative to password or key‑pair logins.

CACertificate AuthenticationLinux
0 likes · 13 min read
How to Secure SSH Access with Certificate‑Based Authentication
Open Source Linux
Open Source Linux
Jul 21, 2020 · Information Security

Master SSH Certificate Authentication: A Step‑by‑Step Secure Login Guide

This article explains why traditional password and key logins are vulnerable, introduces SSH certificate authentication using a Certificate Authority, and provides detailed commands and procedures for generating CA keys, issuing server and user certificates, configuring both server and client, and revoking certificates when needed.

Certificate AuthenticationCertificate AuthorityLinux
0 likes · 12 min read
Master SSH Certificate Authentication: A Step‑by‑Step Secure Login Guide