SSH client
The ssh command on Solaris lets you connect securely to remote servers using username/password or keys.
Solaris · SSH
Solaris · Lesson 8
Secure remote login using SSH in Solaris. Key based authentication setup. Troubleshoot SSH connectivity. Production security hardening.
Secure Shell (SSH) is the default way to manage Solaris and most Unix-like systems remotely. If SSH is down or misconfigured, you may lose remote access to servers completely, so it is important to understand both the SSH client and the SSH daemon (sshd).
In this lesson we focus on checking the SSH service status, making basic connections, setting up key-based authentication and doing simple, safe sshd configuration changes.
The ssh command on Solaris lets you connect securely to remote servers using username/password or keys.
The sshd service listens on port 22 and accepts incoming connections. On Solaris 11, it is managed via SMF.
SSH keys allow you to log in without typing passwords, and are safer when used correctly with restricted permissions.
Use these examples in your Solaris lab: one system acting as the client and another (or the same VM) acting as the SSH server.
On Solaris 11, the SSH daemon (sshd) is managed by SMF. Use svcs to verify its state.
Use the ssh client to log in to another system. Here we connect as user 'oracle' to host dbserver.
Create a key pair for your Solaris user and copy the public key to a remote server.
After copying the key, SSH should authenticate using the private key automatically.
Always make a backup before editing sshd_config, then use vi to make small, controlled changes.
sshd_config, make one small hardening change, restart ssh and verify that access still works.In the next lessons, SSH will be your main entry point for working with processes, services, ZFS and other Solaris features.