Abstract
There’s little argument that SSH (and in particular the OpenSSH implementation) is the remote access method of choice for UNIX-type machines connected to the Internet and to local networks. At times, however, it’s just not convenient to have your SSH key readily available and present on the device that you’re logging in from. If you’ve ever had to type an SSH key in manually, in order to copy it from one device to another, you know it’s a little like trying to push water up a hill. It’s not recommended.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Chris Binnie
About this chapter
Cite this chapter
Binnie, C. (2016). SECURING SSH with PAM. In: Practical Linux Topics. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-1772-6_6
Download citation
DOI: https://doi.org/10.1007/978-1-4842-1772-6_6
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-1771-9
Online ISBN: 978-1-4842-1772-6
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books