Skip to main content

SECURING SSH with PAM

  • Chapter
Practical Linux Topics
  • 4340 Accesses

Abstract

There’s little argument that SSH (and in particular the OpenSSH implementation) is the remote access method of choice for UNIX-type machines connected to the Internet and to local networks. At times, however, it’s just not convenient to have your SSH key readily available and present on the device that you’re logging in from. If you’ve ever had to type an SSH key in manually, in order to copy it from one device to another, you know it’s a little like trying to push water up a hill. It’s not recommended.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Chris Binnie

About this chapter

Cite this chapter

Binnie, C. (2016). SECURING SSH with PAM. In: Practical Linux Topics. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-1772-6_6

Download citation

Publish with us

Policies and ethics