Archives

How to set up an alternative SSH user

In our previous posts we’ve explored some of the many ways of hardening the security of our server. One of the methods we explored was using SSH keys for root login, and disabling password authentication for root. In case we want to disable root login completely, we have to create a new user with root-level …