gptkbp:instance_of
|
gptkb:protocol
|
gptkbp:can_be_extended_by
|
tunneling protocols
SSH agent forwarding
SSH key management
|
gptkbp:can_be_used_with
|
gptkb:SFTP
gptkb:SCP-963
X11 forwarding
|
gptkbp:designed_for
|
secure communication
|
gptkbp:developed_by
|
gptkb:Tatu_Ylönen
|
gptkbp:first_released
|
gptkb:1995
|
https://www.w3.org/2000/01/rdf-schema#label
|
SSH protocol suite
|
gptkbp:includes
|
gptkb:SSH-1
gptkb:SSH-2
|
gptkbp:is_based_on
|
client-server architecture
|
gptkbp:is_compatible_with
|
various operating systems
|
gptkbp:is_implemented_in
|
gptkb:Bitvise_SSH_Server
gptkb:Pu_TTY
gptkb:Win_SCP
gptkb:Dropbear_SSH
gptkb:Open_SSH
|
gptkbp:is_often_used_in
|
network administration
secure shell access
secure file transfers
|
gptkbp:is_part_of
|
network security protocols
secure communication protocols
remote access protocols
|
gptkbp:is_popular_in
|
container orchestration
cloud computing environments
Dev Ops practices
|
gptkbp:is_standardized_by
|
gptkb:IETF_RFC_4251
gptkb:IETF_RFC_4252
gptkb:IETF_RFC_4253
gptkb:IETF_RFC_4254
|
gptkbp:is_used_by
|
gptkb:developers
IT professionals
system administrators
|
gptkbp:provides
|
secure channel over an unsecured network
|
gptkbp:provides_authentication
|
user authentication
|
gptkbp:provides_confidentiality
|
data confidentiality
|
gptkbp:provides_integrity
|
message integrity
|
gptkbp:security
|
man-in-the-middle attacks
symmetric encryption
eavesdropping
session hijacking
|
gptkbp:supports
|
secure file transfer
remote command execution
|
gptkbp:uses_authentication
|
public key authentication
|
gptkbp:bfsParent
|
gptkb:SFTP
|
gptkbp:bfsLayer
|
5
|