top of page
Network


Secure remote access with Yocto
Most embedded system vendors addressing the B2B market want to be able to remotely debug faulting devices to shorten their remediation delays and save some money. Unfortunately, this often results in allowing root (or any other privileged user) to log in via the SSH port. This article explain how SSH certificates and sudo can be used to secure a remote SSH connection.
Michaël Grand
Sep 48 min read
bottom of page