Remote management and information exchange have become the main tools of the system administrator. Safety, reliability and amazing practicality are the main features of SSH. This is what distinguishes SSH access from other options for managing servers, information systems, web resources or equipment.
Providing access to the web resource through SSH - invariably accompanies the commissioning of the site. To know and be able to use SSH are fundamental components of the competence of a modern specialist.
Remote Access Entity
The appearance of the first computer became the basis for the creation of networks, and the first networks caused the creation of terminal classes for servicing many terminal classes by a single large machine (the era of Big Machines). But even then there was a remote control terminal for the Machine itself!
In the modern world, everything has become fundamentally complicated, and the term “protocol” has become the main component of any technology. TCP / IP, FTP, HTTP, HTTPS still have a "value", you can even mention the schemes of building networks, the organization of switching equipment. But with all the importance of outdated and relevant technologies, the concept of “SSH access” is of particular importance.
The word “tunnel” is habitually associated with SSH. In fact, we are talking about the “client - server” connection and the establishment of a channel between them, to wedge into which it is impossible to add or remove from which.
The world has changed so dramatically that in the era of the monsters of computational thought (EU computers and IBM), secure communication channels were associated with engineering solutions made in an “iron” version. Reinforced concrete security is now guaranteed by the simple and convenient idea of SSH. No one will enter the established connection, and nothing will leave its limits!
Using SSH Access
The idea of SSH does not have clear guidelines for a specific operating system, but in the Linux family the most important ideas, protocols, and algorithms are “protected” initially. Nothing here needs to be tweaked or tuned from what is vital.
Typically, SSH access is associated with PuTTY, a terminal similar to Big Machine era terminals. Nothing extra: a black window, the ability to enter a name and password, the ability to specify a port (often this is essential) - and the client from any distance gets safe and stable access to a remote server, system, web resource or equipment.
Classics of the genre: on Windows, Linux, CentOS, UBUNTU, ... SSH access is a console.
Fans of NC, VC, WinCom, Far, Total Commander and other two-window file shells immediately load MC.
Hostname (IP), name and password of the SSH server - this is enough to connect. How a real connection is made is not the point. All that matters is that the SSH client can contact the SSH server, providing a secure tunnel - SSH access.
SSH Graphics Features
Nothing prevents to provide remote work in the schedule. SSH access to the server can be graphical. It is enough to set the X11 forwarding settings on the server and you can remotely run graphical applications.
In some cases, this is the only way to configure something or solve a problem. A simple example: there is remote access, you need to solve the problem - check the site in a virtual machine environment that does not have an external IP. It is impossible to verify the operation of the site outside the local network.
The installation of a graphical environment, without which the browser does not work, will definitely help here. By installing a graphical environment on the machine, you can launch the browser and locally check the work on creating the site.
Perhaps such cases are not rare, perhaps there is real reason to work in the schedule through SSH access to the server, but we are talking about a confidential communication channel. SSH is not a monumental waste of money and time. You can afford to drive tons of graphic information over a secure communication channel, but common sense says: you need to protect what matters, and not what has nothing to do with the concepts of “meaning” and “value”.
SSH setup
As usual, the SSH server immediately starts working. When installing a new operating system, the question is usually asked.
With any answer, Linux will already have OpenSSH. It may not be turned on or inactive, but to start working for it is a matter of a couple of seconds.
System administrators typically restrict root SSH access, but this is more likely a “custom habit” in the area of system administration. It was always believed that the root user could not work remotely with his server.
The only reason SSH settings are best done directly on the server: if an error occurs, you can lose both communication with the server and the chance of its recovery. It’s the same as leaving the keys in the apartment and closing the door with a clear conscience.
Actually, there are not many settings. Initiated experts skillfully use them; the uninitiated does not need to know where and what is located. SSH is the responsibility of the system administrator of the SSH server, not the SSH client.
Systems, Responsibilities and Communications
The rapid development of information technology leads to the continuous birth of new systems and the development of existing ones. Systems must be protected, and access to them must be authorized.
The era of Big Machines was characterized by the fact that there was nothing to steal, and to damage the information system was either useless or pointless.
The modern era is characterized by the fact that sweet informational fruits are the subject of interest of intruders or the basis for the desire to inflict damage.
Access through SSH is a small fraction of the effort, but a fairly effective tool to ensure the stability and security of any system.