In previous tutorials in this series, we went over generating SSH keys and how to use them. We’ll wrap up the series by showing you how to turn off password authentication on your server. Why Configure for SSH Key Authentication Only As mentioned in Part 1, SSH key authentication requires both “something you know” (the […]
Generating and Using SSH Keys, Part 1
Traditionally, authentication in Unix-based systems is done with passwords. This tests “something you know”. SSH keys offer a higher level of security by adding “something you have”- in this case, an SSH private key file. Even if an attacker was to guess your SSH passphrase, without the SSH private key file, this knowledge is […]