Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

NISTIR 7966

Security of Interactive and Automated Access Management Using Secure Shell (SSH)

Date Published: October 2015

Author(s)

Tatu Ylonen (SSH Communications Security), Paul Turner (Venafi), Karen Scarfone (Scarfone Cybersecurity), Murugiah Souppaya (NIST)

Abstract

Keywords

access control; authentication; automated access management; device authentication; interactive access management; Secure Shell (SSH); user authentication
Control Families

Access Control; Audit and Accountability; Security Assessment and Authorization; Contingency Planning; Identification and Authentication; Maintenance; Personnel Security; Planning; Risk Assessment; System and Communications Protection; System and Information Integrity;