Posts

Showing posts from September, 2020

SSH Keys And Their Management.

Image
  SSH keys   or Secure Shell keys are the set of keys, which provides the user with the network security. These keys run under the SSH protocol. These keys are actually used to build a secure network with a connection to the Linux server. SSH keys, always come in a pair, each of them has a private key and a public key. These keys are available in many sizes. Also, one can create their own SSH keys, in a Windows System, by downloading and using an SSH client. The SSH protocol works on the client-server model. These keys can be categorized into two types, based on who or what posses the key pairs: 1. Host Keys 2. Session Keys 3. User Keys SSH Keys  helps in the establishment of the secured network, by executing your command given at a local terminal through an encrypted SSH tunnel. It’s a text-based interfere, which helps you in connecting with the server directly. These keys are actually the set of cryptogenic keys, which are used for authentication. If you plan to establish the SSH key

SSH Key And IAM (Identity and Access Management) — An Insight Into Data Security.

Image
  Secure Shell Keys (SSH Key) Data security is one of the most important components of a progressive IT world. Security, accuracy, and integrity of data is a must for any organization. In today’s day and age, data is equally important as finances, employees, and whatnot. To ensure data security, different mechanisms are used by different organizations based on their scale, level of operation, and work area. SSH i.e Secure Shell keys are one of the most widely used methods to ensure data security. An SSH key is an access credential in the SSH protocol. These keys are based on the principle of Public-key cryptography. A pair of encryption keys are generated which are mathematically linked to each other: a private key and a public key. The public key is used to encrypt a message whereas the private key is used to decrypt it. This provides a very nice property that allows anyone having access to the public key to encrypt a message that can only be decrypted by someone with access to the pr

LDAP Search

Image
  LDAP, the Lightweight Directory Access Protocol is a lightweight client-server protocol for accessing directory services. It is a convenient, flexible, and well-standardized mechanism for the interaction between the directory servers. It enables anyone to situate data about organizations, individuals, and other resources. LDAP can be said as a small amount of code which is a part of X.500. It includes various identifiers called Distinguished Name(DN), a Relative Distinguished Name(RDN), and some other numerous traits defined in schema.  The  LDAP Directory  is almost similar to a database but tends to be more descriptive.  The directory has the ability to redeem or rectify the complete or partial copies of the entries that go with the specific set of search criteria. LDAP Search has certain criteria:  Search Criteria Search Base DN  The Search Base DN is a segment of the Search Request that works in the concurrence with the LDAP Search scope to state the subtree of the entries that a