Posts

Showing posts from August, 2022

What are different SSH Authentication Methods?

Image
  Have you ever tried to set up an ssh connection to Linux machines? Have you ever wondered how many ssh authentication methods you can use to get remote access to a Linux machine?   At the end of the blog post, you will have a great understanding of what are some of the ssh authentication methods that you can use to get remote access to a Linux Machine. For the purpose of demonstration, I will use the following topology. I have three Linux machines. Ubuntu-Workstation having IP address = 10.0.0.249 Ubuntu-Server having IP address = 10.0.2.15 CentOS-Workstation having an IP address = 10.0.2.16 Our main objective will be to get ssh remote access to Ubuntu-Server and CentOS- workstation from Ubuntu -orkstation. I will discuss Three SSH Authentication Methods. Password-Based Authentication Key-Based Authentication  with Passphrase Key-Based Authentication  without Passphrase Before starting make sure that the OpenSSH server is installed on all of these machines. Ubun...