Several authentication methods of Linux SSH

Source: Internet
Author: User
Tags ldap

Introduced

This article said that SSH refers to openssh this open source software, through the OpenSSH official website can be found that its utilization on the server is very high. OPS and developers use it every day, but many people don't know much about how he works and how he authenticates.


Body

SSH authentication methods can be summarized in 4 kinds.

1 PAM Certification

The corresponding parameters in the configuration file/etc/ssh/sshd_config:

Usepam



2 Public key authentication

The corresponding parameters in the configuration file/etc/ssh/sshd_config:

Rsaauthentication, Pubkeyauthentication

When we configured SSH password-free login, we used the Pubkeyauthentication authentication method.


3 Password Authentication

The corresponding parameters in the configuration file/etc/ssh/sshd_config:

Passwordauthentication

This is the way we are going to lose the password when we log on to the server properly.


4 Centralized authentication

LDAP is the most common type of centralized authentication method we use.


The above several authentication methods, in addition to specify with the LDAP such centralized authentication, the other three kinds are in order. Usually priority from high to low is: Public key private key authentication, Pam authentication, password authentication.


Summarize

For the Management Server Operators, if you manage several machines, you can also manually lose password for server management, but if the number of servers is large, you need to adopt centralized authentication management mode.

Now there are many companies dedicated to this audit system, their products include not only the landing audit system, but also the log audit system, database audit system, etc., I will write about the log Audit System blog post, welcome everyone concerned.

Of course, you can try to use LDAP to build a set of landing audit system.

This article from the "Linux and Network" blog, reproduced please contact the author!

Several authentication methods of Linux SSH

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.