Advertisement

SECURING SSH with PAM

  • Chris Binnie

Abstract

There’s little argument that SSH (and in particular the OpenSSH implementation) is the remote access method of choice for UNIX-type machines connected to the Internet and to local networks. At times, however, it’s just not convenient to have your SSH key readily available and present on the device that you’re logging in from. If you’ve ever had to type an SSH key in manually, in order to copy it from one device to another, you know it’s a little like trying to push water up a hill. It’s not recommended.

Keywords

Config File Internet Engineer Task Force Home Directory Verification Code Android Phone 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Chris Binnie 2016

Authors and Affiliations

  • Chris Binnie
    • 1
  1. 1.EdinburghUK

Personalised recommendations