Implementing Zero Trust Model for SSH Security with kerberos and OpenLDAP

Salwa Deta Mediana, Lindawati Lindawati, Mohammad Fadhli
{"title":"Implementing Zero Trust Model for SSH Security with kerberos and OpenLDAP","authors":"Salwa Deta Mediana, Lindawati Lindawati, Mohammad Fadhli","doi":"10.32520/stmsi.v12i3.3330","DOIUrl":null,"url":null,"abstract":"In order to remove trust presumptions towards the internal network, this study addresses the use of the Zero Trust Model in SSH (Secure Shell) security. The study approach is conducting tests by incorporating the Kerberos and OpenLDAP protocols into the SSH infrastructure. While OpenLDAP acts as a central directory for user management and permission access, Kerberos is utilized for single authentication and security resources like Kerberos tickets. As the server operating system for this investigation, Debian was used. Strong justification exists for securing SSH with Kerberos and OpenLDAP. SSH protocol assaults commonly target the standard port 22 (SSH), which is used for SSH. To ensure the security and integrity of the server system, the SSH port must be protected with Kerberos and OpenLDAP. SSH access is limited by Kerberos single authentication, which lowers the possibility of brute-force assaults and password theft. User administration and authorisation are facilitated by the integration of OpenLDAP. Implementing the Zero Trust strategy enables strong authentication and defends the system from insider threats. The system is protected from internal and external network assaults thanks to robust authentication, accurate authorisation, and isolating internal and external networks. An essential step in maintaining the security of the server system, data integrity, and information confidentiality is to secure port 22 and improve SSH with this integration. The research findings show that applying the Zero Trust model through this protocol integration greatly improves system security, resulting in better authentication and authorisation.","PeriodicalId":32357,"journal":{"name":"Jurnal Sistem Informasi","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Jurnal Sistem Informasi","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.32520/stmsi.v12i3.3330","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In order to remove trust presumptions towards the internal network, this study addresses the use of the Zero Trust Model in SSH (Secure Shell) security. The study approach is conducting tests by incorporating the Kerberos and OpenLDAP protocols into the SSH infrastructure. While OpenLDAP acts as a central directory for user management and permission access, Kerberos is utilized for single authentication and security resources like Kerberos tickets. As the server operating system for this investigation, Debian was used. Strong justification exists for securing SSH with Kerberos and OpenLDAP. SSH protocol assaults commonly target the standard port 22 (SSH), which is used for SSH. To ensure the security and integrity of the server system, the SSH port must be protected with Kerberos and OpenLDAP. SSH access is limited by Kerberos single authentication, which lowers the possibility of brute-force assaults and password theft. User administration and authorisation are facilitated by the integration of OpenLDAP. Implementing the Zero Trust strategy enables strong authentication and defends the system from insider threats. The system is protected from internal and external network assaults thanks to robust authentication, accurate authorisation, and isolating internal and external networks. An essential step in maintaining the security of the server system, data integrity, and information confidentiality is to secure port 22 and improve SSH with this integration. The research findings show that applying the Zero Trust model through this protocol integration greatly improves system security, resulting in better authentication and authorisation.
用kerberos和OpenLDAP实现SSH安全的零信任模型
为了消除对内部网络的信任假设,本研究解决了在SSH (Secure Shell)安全中使用零信任模型的问题。研究方法是通过将Kerberos和OpenLDAP协议合并到SSH基础设施中来进行测试。OpenLDAP充当用户管理和权限访问的中心目录,而Kerberos则用于单一身份验证和Kerberos票据等安全资源。作为本次调查的服务器操作系统,我们使用了Debian。使用Kerberos和OpenLDAP保护SSH是有充分理由的。SSH协议攻击通常针对标准端口22 (SSH),该端口用于SSH。为了保证服务器系统的安全性和完整性,需要使用Kerberos和OpenLDAP对SSH端口进行保护。SSH访问受到Kerberos单一身份验证的限制,这降低了暴力攻击和密码盗窃的可能性。OpenLDAP的集成简化了用户管理和授权。实现零信任策略可以实现强身份验证,并保护系统免受内部威胁。由于强大的身份验证,准确的授权和隔离内部和外部网络,系统免受内部和外部网络的攻击。维护服务器系统的安全性、数据完整性和信息机密性的一个重要步骤是保护端口22,并通过这种集成改进SSH。研究结果表明,通过该协议集成应用零信任模型,大大提高了系统的安全性,实现了更好的认证和授权。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
12
审稿时长
12 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信