Please enable JavaScript.
Coggle requires JavaScript to display documents.
SSH ("Secure Shell" (Several ways (Use automatically generated…
SSH
"Secure Shell"
-
-
-
-
The public key is placed on all computers that must allow access to the owner of the matching private key
-
-
SSH only verifies whether the same person offering the public key also owns the matching private key
History
Version 1.x
1995, Tatu Ylönen, a researcher at Helsinki University of Technology, Finland, designed the first version of the protocol
-
The goal of SSH was to replace the earlier rlogin, TELNET, ftp and rsh protocols
-
-
-
-
-
-
Key
On Unix-like systems, the list of authorized public keys is typically stored in the home directory of the user that is allowed to log in remotely
-
-
-
The ssh-keygen utility produces the public and private keys, always in pairs
-