SSH remains a top attack vector 30 years after its introduction. This post covers hardening strategies for Ubuntu environments, including replacing static keys with centralized identity management via SSSD for Active Directory and authd for cloud IdPs like Microsoft Entra ID and Google Cloud IAM. authd uses OAuth 2.0 Device

5m read timeFrom ubuntu.com
Post cover image
Table of contents
Linking identity systems to SSHHow can you use IdPs to authenticate SSH sessions?Meeting your compliance and cryptographic requirementsCan you enforce policies at scale?Security checklist: hardening SSHRead more in our identity management whitepaper

Sort: