Using SSH for remote logins

SSH (secure shell) is a program for remote login to Unix machines. Together with similar programs for remote copying, they are indispensable tools for using Linux servers, e.g. the Abel cluster or other supercomputing resources. SSH uses strong cryptography to make your connections secure from eavesdropping and tampering.

Time and place 

January 9th 2019, 09:00-12:00, Niels Henrik Abels hus, room 126

Sign up by January 4th  

Subjects covered

This introduction aims to teach you how to use SSH efficiently and  securely, and covers the basics ideas of cryptography.

The subjects covered include:

  • symmetric and asymmetric cryptography, public key cryptography
  • ssh key authentication
  • ssh agents
  • ssh tunnelling and port forwarding

In the workshop we will help participants set up ssh keys on the laptops they bring with them.


A laptop. Basic knowledge of the Unix shell is recommended. Login rights to a Unix server is useful (all UiO users have this).

Target audience

Anyone, in particular if you need to use Linux servers, eg. HPC resources.


Hans Peter Verne (UiO)


Research Bazaar @ UiO

Published Nov. 28, 2018 9:45 AM - Last modified Jan. 3, 2019 9:23 AM