Using SSH for remote logins
SSH (secure shell) is a program for remote login to Unix machines. Together with similar programs for remote copying, they are indispensable tools for using Linux servers, e.g. the Abel cluster or other supercomputing resources. SSH uses strong cryptography to make your connections secure from eavesdropping and tampering.
Time and place
January 9th 2019, 09:00-12:00, Niels Henrik Abels hus, room 126
This introduction aims to teach you how to use SSH efficiently and securely, and covers the basics ideas of cryptography.
The subjects covered include:
- symmetric and asymmetric cryptography, public key cryptography
- ssh key authentication
- ssh agents
- ssh tunnelling and port forwarding
In the workshop we will help participants set up ssh keys on the laptops they bring with them.
A laptop. Basic knowledge of the Unix shell is recommended. Login rights to a Unix server is useful (all UiO users have this).
Anyone, in particular if you need to use Linux servers, eg. HPC resources.
Hans Peter Verne (UiO)