Topic: Configuring SSH authentication using a key Session- 25 DEPARTMENT OF CSE COURSE NAME – Continuous Delivery & DevOps COURSE CODE –
2 2 AIM OF THE SESSION To familiarize students with the basic concept agile modeling INSTRUCTIONAL OBJECTIVES This Session is designed to: To Demonstrate Configuring SSH authentication using a key LEARNING OUTCOMES At the end of this session , you should be able to: Can able to Describe about Configuring SSH authentication using a key
SESSION INTRODUCTION AGENDA Configuring SSH authentication using a key
Configuring SSH authentication using a key SSH keys are authentication credentials. SSH (Secure Shell) is used for managing networks, operating systems, and configurations. SSH keys enable the automation that makes modern cloud services and other computer-dependent services possible and cost-effective . They offer convenience and improved security when properly managed.
Functionally SSH keys resemble passwords. They grant access and control who can access what. In identity and access management, they need similar policies, provisioning, and termination as user accounts and passwords. One cannot have confidentiality, integrity, or any guarantees of continued availability of systems without controlling SSH keys.
Before starting with end-to-end automation and orchestration, we need to configure SSH authentication using a key. The objective behind it is to allow the Jenkins VM to connect to the Chef workstation. Then, we can issue SSH commands from the Jenkins dashboard on the Chef workstation VM to create an instance in AWS or Azure cloud and install a runtime environment on it to deploy the PetClinic application:
9. Click on Save . Click on the Build Now link to execute the build job.
15. In our case, it will start downloading the Chef client and installing it on the AWS instance:
16. Verify the Chef installation process on the console:
17. Once the Chef client is installed on the AWS instance, it will start its first Chef client execution.
SELF-ASSESSMENT QUESTIONS Demonstrate Configuring SSH authentication using a key? Describe Orchestrating Application Deployment Popular ?
REFERENCES FOR FURTHER LEARNING OF THE SESSION TEXTBOOKS: DevOps for Web Development , Mitesh Soni , Packt Publisher. Reference Book Beginning DevOps With Docker , Joseph Muli , Packt Publisher. WEB REFERNCES/MOOCS: https://www.coursera.org/programs/cse-faculty-courses-an6zm/browse?collectionId=&productId=Q5Krn5BMEei3MQqxoqmsBA&productType=course&query=continuous+delivery+and+devops++course&showMiniModal=true&source=2