We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Large Scale SSH

Formal Metadata

Title
Large Scale SSH
Alternative Title
SSH Key Management
Title of Series
Number of Parts
45
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
SSH is arguably the most widely deployed systems administration tool. It's also arguably the least well configured. Many sysadmins already know how to disable passwords and chroot users, but when it comes to managing host and user SSH keys, we rely on manually copying files around. That's fine with three servers and two sysadmins, but not so good with three thousand servers and two hundred sysadmins. We'll fill in those gaps. SSH is arguably the most widely deployed systems administration tool. It's also arguably the least well configured. Many sysadmins already know how to disable passwords and chroot users, but when it comes to managing host and user SSH keys, we rely on manually copying files around. That's fine with three servers and two sysadmins, but not so good with three thousand servers and two hundred sysadmins. This talk takes you through: Key file formats Distributing the host key cache to OpenSSH and PuTTY clients Distributing client configurations OpenSSH configuration for automatic deployment and cloud configuration Improving the security of known_hosts SSH keys for automation Building and deploying SSH Certificate Authorities Attendees will leave understanding how to scale their SSH systems--and, more importantly, when to scale those systems to the next level. Based on the book "SSH Mastery, 2nd Edition"