Implementing Two-Factor Authentication (2FA) with SSH

Two-factor authentication (2FA) is an essential security measure that significantly enhances the protection of SSH (Secure Shell) access. By requiring an additional verification step beyond just a password or key, 2FA mitigates the risk of unauthorized access even if a password or private key is compromised. This article provides a comprehensive guide on implementing 2FA […]

Continue Reading…

SSH Key Management: Best Practices and Tools

Secure Shell (SSH) is a powerful protocol for securing remote connections, and key-based authentication is a cornerstone of SSH security. Properly managing SSH keys is crucial for maintaining a secure infrastructure. This article explores best practices for SSH key management, including the use of OpenSSH certificates, and reviews tools that can automate and enhance the […]

Continue Reading…

Advanced SSH Configuration and Security Best Practices

SSH (Secure Shell) is a critical tool for securing remote connections, enabling administrators and developers to access and manage remote servers securely. While SSH is inherently secure, advanced configuration can significantly enhance its security posture. This article delves into advanced SSH configurations and best practices to ensure robust security. 1. Key-Based Authentication One of the […]

Continue Reading…

How to mitigate against SSH Vulnerability CVE-2023-48795 with Maverick Legacy Client

There are several options available to mitigate the risk of exposure to CVE-2023-48795 for Maverick Legacy Client-enabled applications In code Use the code below before making any call to SshConnector.connect. Using System Properties You do not need to make any code changes if you have a sensitive deployment. By adding the JVM arguments below, you […]

Continue Reading…