SSH (Secure Shell) is like a secure tunnel in the internet world, similar to how we need keys to open our front door - SSH enables us to safely access remote servers.
Core SSH Functions:
SSH Key Authentication Using asymmetric encryption, two keys are generated:
When we execute:
ssh-keygen -t rsa -f gcp -C yedan -b 2048
Each component serves a specific purpose:
t rsa
: Selects RSA encryption algorithm, one of the most reliable encryption methodsf gcp
: Specifies the key file nameC yedan
: Adds an identifier for managementb 2048
: Sets key length, higher numbers mean more security.ssh Directory Analysis Windows and Unix/Linux systems have a .ssh folder in the user directory, containing: