Secure Shell (SSH) Tutorial

Overview

To ensure the integrity of user accounts, the College of Computing requires encrypted transmission of all credentials. We employ Secure Shell (SSH) to provide secure, remote access to our Linux-based servers. SSH supports both password- and public key-based authentication. The private key takes the place of a password. Instead of typing in a password on the keyboard, you supply a file with your key in it. Private keys are extremely hard to decrypt or guess, and there is no password for a key logger to steal.

Authenticate Small Devices On LAWN

Thanks to the OIT LAWN Team, a new feature was recently released but not widely announced (yet) that allows one to authenticate devices to LAWN via another computer browser. This should prove very useful for authenticating devices (e.g. robots, game consoles, etc.) that do not have a programmable network stack or browser capabilities. All you need to know is the ethernet address for the device. The device will keep it's DHCP lease until it rebooted. If you find this feature useful, please send a word of thanks to matt.sanders@oit.