SSH security improvements: Difference between revisions

Jump to navigation Jump to search
no edit summary
(Marked this version for translation)
No edit summary
Line 12: Line 12:


<!--T:37-->
<!--T:37-->
[[SSH]] is the software protocol that you use to connect to Compute Canada clusters.  It helps to protect the security of your data by verifying your identity to the server, verifying the server's identity to you, and encrypting the connection.  Because security risks evolve over time, Compute Canada will soon end support for certain SSH options which are no longer deemed secure.  You will have to make some changes on your part in order to continue using our clusters.  The changes are outlined in the flowchart to the right, and explained in greater detail below.
[[SSH]] is the software protocol that you use to connect to Compute Canada clusters.  It protects the security of your data by verifying the server’s identity and yours against known identification data, and by encrypting the connection.  Because security risks evolve over time, Compute Canada will soon end support for certain SSH options which are no longer deemed secure.  You will have to make some changes on your part in order to continue using our clusters.  The changes are outlined in the flowchart to the right, and explained in greater detail below.


=SSH changes (Summer 2019)= <!--T:1-->
=SSH changes (Summer 2019)= <!--T:1-->
rsnt_translations
56,426

edits

Navigation menu