Security and Safe Use of SSH Keys

This lessons gives an overview of the importance of security and the safe use of HPC systems and related services which may use shh keys.

Prerequisites:

  • Experience or need to work with HPC systems.
  • Wanting to learn how to work securely and conveniently with remote servers and services.

Schedule:

Time Episode Description
0:00 Security Why must I care about security?
0:10 SSH access What is ssh and how do I use it?
0:20 Passwords How can I create secure passwords?
0:30 SSH keys What are ssh keys and how can I use them safely?
0:45 National/Regional HPC How do I work with keys on National/Regional services?
1:00 Unmanaged systems How can I manage my keys on remote systems?
1:15 SSH Agent How can I work more convenientely with ssh keys?
1:30 Agent forwarding How do work securely with keys on multiple systems?
1:45 ssh config What other automagic can I do with ssh config?

References

This material draws from a number of resources:

  1. Archer 2 connecting docs
  2. Levi Velazquez How to use SSH properly ...