Posted in Access restrictions DDoS Digital Certificate

SSH restrictions using public keys, commands and allowed hosts

Description You want to manage an ssh server that can be reached by specific IPs and only specified commands will be accessible to the ssh user. Explanation In our example we have 2 hosts located in the same network (to prove the concept) with followings IP’s: 192.168.122.1 (backend) and 192.168.122.157…

Continue Reading SSH restrictions using public keys, commands and allowed hosts