Now a wheel user is added and you can only log in to SSH as that particular user and after logging in, you can switch to Root. WHM > Security Center > Manage Wheel Group Users > Select the user and click ‘Add to Group’. Now go to WHM and add the user to the wheel user group. Now, you have to create a new wheel user simply with, adduser Īdding a new user is not necessary, if you want an existing user to be the wheel user, you can skip the above step. Please note that if you terminate the session now, you can’t log in as a root user. Set PermitRootLogin to ‘No PermitRootLogin no Open the SSH config file nano /etc/ssh/sshd_config So that SSH will only connect as that user. The idea behind this process is to disable Root SSH login and create a new user and add the new user or an existing user to the Wheel user group. With this setup, you can only log in to the server as the desired user. Other means to secure SSH are: Setup Wheel User #HOST URL ACCESS TO ROOT BYPASS CPANEL UPDATE#For this always update the SSH packages to the latest stable version. It is important to secure SSH/Shell for restricting the attacks through it. SSH/Shell is the remote connectivity tool in Linux with which users can connect to the server remotely. There are online tools to check password strength and it can guide you to set a strong password. So keep strong and lengthy alphanumeric passwords with multiple characters. Because it is widely open to the world otherwise. If the passwords are not strong enough to withstand the brute force, there is no point in securing the server with other means. Here are a few basic steps that you should keep in mind for keeping a server secure.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |