SSH Configuration Interface. Design and Implementation of a “student self-service portal” for accessing to Linux-VMs

SSH Configuration Interface. Design and Implementation of a “student self-service portal” for accessing to Linux-VMs
Author :
Publisher : GRIN Verlag
Total Pages : 61
Release :
ISBN-10 : 9783346527226
ISBN-13 : 3346527220
Rating : 4/5 (26 Downloads)

Book Synopsis SSH Configuration Interface. Design and Implementation of a “student self-service portal” for accessing to Linux-VMs by : Gheorghe Mironica

Download or read book SSH Configuration Interface. Design and Implementation of a “student self-service portal” for accessing to Linux-VMs written by Gheorghe Mironica and published by GRIN Verlag. This book was released on 2021-11-02 with total page 61 pages. Available in PDF, EPUB and Kindle. Book excerpt: Bachelor Thesis from the year 2020 in the subject Computer Science - Software, grade: 1.7, University of Applied Sciences Ulm, course: Computer Science, language: English, abstract: Secure Shell (SSH) is mainly used for managing most of the world’s web servers. It creates a secure channel on top of an unsecured network by using the client-server model. The problem arises with the increase in the number of clients that leads to a corresponding increase in the maintenance work for the server administration. This thesis offers an insight into this problem and the solution to it. The SSH Configuration Interface (SSH CI) is one possible solution to simplify the process. It’s a client-server application that provides a simple but intuitive user interface (UI) to the users, so they can upload their public key directly to the server. The server thereon handles the request and, thus, excludes the need of an administration interaction from this process. The SSH protocol uses encryption to secure the connection between a client and a server. It’s mainly used to log into a remote machine and execute commands, but there are other useful features available like tunneling and forwarding of Transmission Control Protocol (TCP) ports. An SSH connection supports multiple methods of authentication, the most common being the public key authentication. The advantage of it over a simple password, for example, is security and flexibility. Public key authentication provides a security level that even extremely long passwords can’t offer. In a situation where multiple users have access to the same account on the server by using SSH key authentication, it is easy to revoke access to any of them just by deleting their public key from the server. No password has to be shared across the users.


SSH Configuration Interface. Design and Implementation of a “student self-service portal” for accessing to Linux-VMs Related Books

SSH Configuration Interface. Design and Implementation of a
Language: en
Pages: 60
Authors: Gheorghe Mironica
Categories:
Type: BOOK - Published: 2021-10-20 - Publisher:

DOWNLOAD EBOOK

Bachelor Thesis from the year 2020 in the subject Computer Science - Software, grade: 1.7, University of Applied Sciences Ulm, course: Computer Science, languag
SSH Configuration Interface. Design and Implementation of a “student self-service portal” for accessing to Linux-VMs
Language: en
Pages: 61
Authors: Gheorghe Mironica
Categories: Computers
Type: BOOK - Published: 2021-11-02 - Publisher: GRIN Verlag

DOWNLOAD EBOOK

Bachelor Thesis from the year 2020 in the subject Computer Science - Software, grade: 1.7, University of Applied Sciences Ulm, course: Computer Science, languag
Setup of a Graphical User Interface Desktop for Linux Virtual Machine on Cloud Platforms
Language: en
Pages: 72
Authors: Dr. Hidaia Mahmood Alassouli
Categories: Computers
Type: BOOK - Published: 2021-07-26 - Publisher: Dr. Hidaia Mahmood Alassouli

DOWNLOAD EBOOK

Cloud Platforms provide VM images in the Linux OS as well. Linux has always been operated via terminal or shell through a keyboard and a terminal. Even with GUI
Linux Basics for Hackers
Language: en
Pages: 249
Authors: OccupyTheWeb
Categories: Computers
Type: BOOK - Published: 2018-12-04 - Publisher: No Starch Press

DOWNLOAD EBOOK

This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux comm
Design and Implementation of Telemedicine Client-Server Model Using Encryption and Decryption Algorithm in Single Core and Multicore Architecture on L
Language: en
Pages: 89
Authors: Manjunath Basavaiah
Categories: Computers
Type: BOOK - Published: 2012-03-08 - Publisher: GRIN Verlag

DOWNLOAD EBOOK

Project Report from the year 2011 in the subject Computer Science - Applied, Coventry University (M.S. Ramaiah School of Advanced Studies), course: M. Sc. [Engg