Introduced
This article said that SSH refers to openssh this open source software, through the OpenSSH official website can be found that its utilization on the server is very high. OPS and developers use it every day, but many people don't know much about how he works and how he authenticates.
Body
SSH authentication methods can be summarized in 4 kinds.
1 PAM Certification
The corresponding parameters in the configuration file/etc/ssh/sshd_config:
Usepam
2 Public key authentication
The corresponding parameters in the configuration file/etc/ssh/sshd_config:
Rsaauthentication, Pubkeyauthentication
When we configured SSH password-free login, we used the Pubkeyauthentication authentication method.
3 Password Authentication
The corresponding parameters in the configuration file/etc/ssh/sshd_config:
Passwordauthentication
This is the way we are going to lose the password when we log on to the server properly.
4 Centralized authentication
LDAP is the most common type of centralized authentication method we use.
The above several authentication methods, in addition to specify with the LDAP such centralized authentication, the other three kinds are in order. Usually priority from high to low is: Public key private key authentication, Pam authentication, password authentication.
Summarize
For the Management Server Operators, if you manage several machines, you can also manually lose password for server management, but if the number of servers is large, you need to adopt centralized authentication management mode.
Now there are many companies dedicated to this audit system, their products include not only the landing audit system, but also the log audit system, database audit system, etc., I will write about the log Audit System blog post, welcome everyone concerned.
Of course, you can try to use LDAP to build a set of landing audit system.
This article from the "Linux and Network" blog, reproduced please contact the author!
Several authentication methods of Linux SSH