Accessing Linux Systems Using RHEL 8

45 minutes
  • 4 Learning Objectives

About this Hands-on Lab

In this hands-on lab, we will take a look at the `su` command, explore the power of the `ssh` command, configure key-based authentication for SSH, and take a look at the SSH utilities for secure file transfer.

*This course is not approved or sponsored by Red Hat.*

Learning Objectives

Successfully complete this lab by achieving the following learning objectives:

Log in and Switch Users

Sign in to the lab system and perform user account elevation tasks.

Access Remote Systems Using SSH
  1. Connect to a remote system via ssh and run some performance-related queries.
  2. Query the remote system and have the output returned to the initial system.
Configure Key-Based Authentication for SSH
  1. Generate a public/private key pair using the defaults.
  2. Copy that ID to the remote server.
  3. Connect to the remote server and test your access with the key.
Securely Transfer Files between Systems
  1. Execute a backup command on a remote system.
  2. Copy the resulting file from the remote system to the local system using scp. Bonus points if you can do it without having to type a password!

Additional Resources

Before we can work with a system, we need to access it first. A Linux system administrator works with a number of different user accounts in the course of their regular day. Understanding how to leverage different user accounts and their associated environments is a key skill.

Since most system logins won't be at the console, the SSH utility is a key tool in any Linux system administrator's toolbox. It allows users to not only make secure connections to other hosts but also securely execute commands on remote systems, securely tunnel services and X11 sessions, transfer files, and more.

Using passwords for user authentication has been the standard for a long time. But what if you need to make connections or execute remote commands without interaction? SSH provides a mechanism for this via key-based authentication.

Red Hat Exam Requirements Covered:

  • Log in and switch users in multi-user targets
  • Access remote systems using SSH
  • Configure key-based authentication for SSH
  • Securely transfer files between systems

What are Hands-on Labs

Hands-on Labs are real environments created by industry experts to help you learn. These environments help you gain knowledge and experience, practice without compromising your system, test without risk, destroy without fear, and let you learn from your mistakes. Hands-on Labs: practice your skills before delivering in the real world.

Sign In
Welcome Back!

Psst…this one if you’ve been moved to ACG!

Get Started
Who’s going to be learning?