SSH (Secure Shell) is a network protocol used for securely connecting to a remote computer over an unsecured network, such as the internet. It provides a secure channel over which encrypted communication can take place between two computers.

SSH is typically used for remote administration of servers or other networked devices, and it allows users to access a command line interface on the remote computer. It is often used for remote login, file transfers, and tunneling of other network protocols.

SSH uses a combination of public-key cryptography and symmetric encryption to provide secure communication between the two computers. When a user connects to a remote computer using SSH, the user’s credentials are verified, and a secure connection is established. All data sent over this connection is encrypted to protect it from interception or eavesdropping.

In this section of the knowledge base we will cover access controls as it relates to SSH.

Next Article: What Are Public and Private Keys?