Blog Post Header
Tutorials December 25, 2025 7 views

Configuring SSH Access and Disabling Root Login

Configuring SSH Access and Disabling Root Login

Configuring SSH Access and Disabling Root Login

Secure Shell (SSH) is a protocol used to securely connect to remote servers and transfer data. It is essential to configure SSH access properly to ensure the security of your server. One important security measure is disabling root login, as it can prevent unauthorized access and potential security threats. In this tutorial, we will guide you through the process of configuring SSH access and disabling root login on your server.

Step 1: Update SSH Configuration

The first step is to update the SSH configuration file on your server. You can do this by editing the /etc/ssh/sshd_config file. Open the file using a text editor such as nano or vi:

sudo nano /etc/ssh/sshd_config

Find the following lines in the file:

PermitRootLogin yes
PasswordAuthentication yes

Change the values to:

PermitRootLogin no
PasswordAuthentication no

Save the file and restart the SSH service to apply the changes:

sudo systemctl restart sshd

Step 2: Create a New User

It is recommended to create a new user with sudo privileges to manage your server. You can create a new user using the following command:

sudo adduser newuser

Follow the prompts to set a password and other details for the new user. Once the user is created, add them to the sudo group to grant administrative privileges:

sudo usermod -aG sudo newuser

Step 3: Set Up SSH Keys

SSH keys provide a more secure way to authenticate to your server compared to passwords. To set up SSH keys, generate a new key pair on your local machine using the following command:

ssh-keygen

Copy the public key to the server using the following command:

ssh-copy-id newuser@server_ip

Now you can log in to the server using SSH keys without entering a password:

ssh newuser@server_ip

Step 4: Test SSH Configuration

After making the necessary changes, it is essential to test the SSH configuration to ensure everything is working correctly. Try to log in to the server using the new user account and SSH keys. If you can successfully log in without any issues, the configuration is correct.

Conclusion

Configuring SSH access and disabling root login are crucial steps in securing your server. By following the steps outlined in this tutorial, you can enhance the security of your server and protect it from potential security threats. Remember to regularly update your server and monitor SSH access to maintain a secure environment.

Author: Admin
Join Our Community

Create an account to leave comments, save your favorite posts, and get personalized recommendations.