Automation with SSH tunneling
In the last post I covered how SSH key pairs can be used as a form of two factor authentication, commonly known as 2FA. In this post I’ll be covering SSH as a means to establish secure communications between systems. Using SSH will provide a way to run commands on remote hosts, whether they be on node on a local network or accross the globe. The key pair security is a way to set the remote host to only allow…