In this hands-on lab, we will take a look at the `su` command, explore the power of the `ssh` command, configure key-based authentication for SSH, and take a look at the SSH utilities for secure file transfer.
*This course is not approved or sponsored by Red Hat.*
Learning Objectives
Successfully complete this lab by achieving the following learning objectives:
- Log in and Switch Users
Sign in to the lab system and perform user account elevation tasks.
- Access Remote Systems Using SSH
- Connect to a remote system via
ssh
and run some performance-related queries. - Query the remote system and have the output returned to the initial system.
- Connect to a remote system via
- Configure Key-Based Authentication for SSH
- Generate a public/private key pair using the defaults.
- Copy that ID to the remote server.
- Connect to the remote server and test your access with the key.
- Securely Transfer Files between Systems
- Execute a backup command on a remote system.
- Copy the resulting file from the remote system to the local system using
scp
. Bonus points if you can do it without having to type a password!