SSH, or Secure Shell, is a remote administration protocol that allows users to control and modify their remote servers over the Internet.
Secure Shell provides strong authentication and encrypted data communications between two computers connecting over an open network such as the internet. SSH is widely used by network administrators for managing systems and applications remotely, allowing them to log into another computer over a network, execute commands and move files from one computer to another.
How SSH Encryption Works
It allows the user to run commands on remote computers securely, using a secure channel over an unsecured network. Essentially, this is what it’s all about — the protocol enables a secure channel over an insecure network.
It uses public key cryptography, but manual keys can be employed as well. The protocol relies on one private key and one or more public keys used on the server and client.
Secure Shell capabilities
Functions that SSH enables include:
- Secure remote access to SSH-enabled network systems or devices, for users as well as automated processes;
- secure and interactive file transfer sessions;
- automated and secured file transfers;
- secure issuance of commands on remote devices or systems;
- secure management of network infrastructure components.