MIAP Digital Literacy Command Line Guide

Learn about BASH commands!

View on GitHub

SSH: Secure Shell Command

SSH, or Secure Shell, is a cryptographic network protocol for operating network services securely over an unsecured network. It’s most commonly used to access remote machines and execute commands, but it also supports tunneling, forwarding TCP ports, and X11 connections.

How SSH Works

SSH provides a secure channel over an insecure network by using a client-server architecture. Here’s a simplified breakdown:

  1. Connection Request: The SSH client initiates a connection to the SSH server.
  2. Key Exchange: The client and server negotiate encryption algorithms and exchange cryptographic keys to establish a secure connection.
  3. User Authentication: The server authenticates the client, usually using a password or a public-key cryptography system.
  4. Secure Channel: Once authenticated, a secure channel is established, and all further communication is encrypted.

Key Features of SSH

Use Cases for SSH

Getting Started with SSH

Most modern operating systems come with an SSH client pre-installed. To connect to a remote server, you’ll need the server’s IP address or hostname, a username, and a password or SSH key.

Basic SSH command syntax:

bash ssh username@hostname_or_IP_address

Go back to the main list of commands