Menu Shape 3 copy 2Created with Avocode.
webinara overview
IT and Technology

Keeping your Remote Access Private with SSH keys

THIS WEBINAR WAS RECORDED ON THE

August 25, 2015

Duration

60 min

WATCH WEBINAR
webinar description

In this webinar we’ll discuss the basics of SSH authentication – passwords, keys, and MFA, oh my! We’ll also investigate some common patterns of key propagation — how do you get your users’ keys onto the appropriate machines — including:

* Manual distribution
* LDAP
* Puppet/Chef configuration
* Advanced techniques

We’ll also highlight the different challenges involved when doing this against different IaaS vendors (AWS and GCE), in a locally-hosted environment, and in the hybrid of the two.

Reasons to attend the webinar
  • Basics of SSH authentication

  • Common patterns of key propagation

  • Challenges involved with different IaaS vendors

Speakers:
DevOps.com
Alan Shimel, Editor-In-Chief
An often-cited personality in the security and technology community and a sought-after speaker at industry and government events, Alan has helped build several successful technology companies by combining a strong business background with a deep knowledge of technology.
JumpCloud
Topher Marie, CTO
Topher is the CTO and Co-Founder of JumpCloud. Previously he spent five years at Symplified as its lead engineer holding a variety of titles including Architect and Development Manager. The bulk of his time was spent wrestling with the concepts and mechanisms of provable identity – SAML, IWA/Kerberos, PKI, OAuth, OpenID, and multi-factor authentication to name a few.Topher holds Bachelor and Master of Science degrees from the Colorado School of Mines in the area of Math with emphasis in Computer Science. He also spent several subsequent years at that university as a part-time professor for both computer science and pure math courses.

DevOps.com has quickly established itself as an indispensable resource for DevOps education and community building. We make it our mission to cover all aspects of DevOps—philosophy, tools, business impact, best practices and more.

Other webinars you may like
FREE
Jun 18, 10.00 AM (GMT -07:00)
Process Discovery, Automation & Intelligence
Digital business is all about enabling new competitive advantages – achieved by conducting business in ways that prospects and customers recognize as superior to rivals and thus award you their business. ‘How’ an enterprise delivers customer value determines its competitive advantage,
Nintex
Speaker - Ryan Duguid
More info
FREE
Jun 20, 1.00 PM (GMT -04:00)
Industrial Cybersecurity
Food and beverage production is a rapidly changing industry, incorporating increased automation, centralized Manufacturing Intelligence (MI), and interdependent supply chains. This and the complexities of these networked systems serves to amplify cybersecurity threats and vulnerabilities, creating risks
Blentech Corporation
Speaker - Matthew Hartman PE
More info
FREE
Jun 25, 1.30 PM (GMT -04:00)
Ensure Enterprise-Grade Security for Your Mobile Apps
5G promises to be a game changer for mobile. Technology has leaned forward to enable massive processing power at blistering speeds, yet the true value of mobile as not just a communication device, but a compute platform, has yet to be realized. Why? The number one gating factor for true edge compute
BankInfoSecurity
Speaker - Bank InfoSecurity
More info
Other webinars you may like
FREE
Jun 18, 10.00 AM (GMT -07:00)
Process Discovery, Automation & Intelligence
Digital business is all about enabling new competitive advantages – achieved by conducting business in ways that prospects and customers recognize as superior to rivals and thus award you their business. ‘How’ an enterprise delivers customer value determines its competitive advantage,
Nintex
Speaker - Ryan Duguid
More info
FREE
Jun 20, 1.00 PM (GMT -04:00)
Industrial Cybersecurity
Food and beverage production is a rapidly changing industry, incorporating increased automation, centralized Manufacturing Intelligence (MI), and interdependent supply chains. This and the complexities of these networked systems serves to amplify cybersecurity threats and vulnerabilities, creating risks
Blentech Corporation
Speaker - Matthew Hartman PE
More info
FREE
Jun 25, 1.30 PM (GMT -04:00)
Ensure Enterprise-Grade Security for Your Mobile Apps
5G promises to be a game changer for mobile. Technology has leaned forward to enable massive processing power at blistering speeds, yet the true value of mobile as not just a communication device, but a compute platform, has yet to be realized. Why? The number one gating factor for true edge compute
BankInfoSecurity
Speaker - Bank InfoSecurity
More info
Other webinars you may like
FREE
Duration: 30 Min
Business Data Onboarding Better By 10X With Large File Data Ingestion
Large volume of data is an old adversary of data integration and onboarding solutions. Enterprises relying on sub-par data exchange technology can barely handle files more than 1 GB, which is abominably low per today’s standards. Moreover, they consume a fair amount of money, time, and effort
Adeptia Inc.
Speaker - Raman Singh
More info
FREE
Duration: 60 Min
User Onboarding Emails that Drive Customer Success and Free-to-Paid Conversions
It’s time to dust off your user onboarding emails and make them your highest converting channel. Chameleon and Sendwithus are excited to host Alli Blum, a SaaS onboarding expert and conversion copywriter who will share her strategies for designing an onboarding email sequence that drives more
Chameleon
Speaker - Alli Blum
More info
FREE
Duration: 60 Min
Business Intelligence and Advanced Analytics
Why is your data important? Having an agile, modern Business Intelligence & Advanced Analytics platform enables fast & accurate access to critical insights across a range of analytics. Organizations in the global trade era must quickly and successfully navigate supply chains, converting data
nVision Global
Speaker - Luther Brown
More info
SHOW ALL WEBINARS
ARE YOU 100% SURE YOU WANT TO YOU WANT TO DISCONNECT ?

Yes No
ARE YOU 100% SURE YOU WANT TO REMOVE THIS SPEAKER ?

Yes No
THIS SPEAKER CANNOT BE REMOVED. YOU HAVE ALREADY SELECTED THIS SPEAKER ABOVE. SELECT ANOTHER SPEAKER ABOVE TO REMOVE IT.

OK
PLEASE TYPE A VALID KEYWORD IN THE SEARCH FIELD