{"id":183,"date":"2020-04-27T09:27:43","date_gmt":"2020-04-27T09:27:43","guid":{"rendered":"https:\/\/pheonixsolutions.com\/knowledge-base\/?p=183"},"modified":"2026-04-11T11:25:55","modified_gmt":"2026-04-11T11:25:55","slug":"how-to-secure-ssh-access-on-centos-7","status":"publish","type":"post","link":"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/27\/how-to-secure-ssh-access-on-centos-7\/","title":{"rendered":"How to Secure SSH Access on CentOS 7"},"content":{"rendered":"\n<h4 class=\"wp-block-heading\"><strong>Introduction:<\/strong><\/h4>\n\n\n\n<p><strong>SSH<\/strong>, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.<\/p>\n\n\n\n<p>It provides several alternative options for strong authentication, and it protects the communications security and integrity with strong encryption.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"543\" height=\"269\" src=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2020\/04\/ssh-180423135743-thumbnail-4.jpg\" alt=\"\" class=\"wp-image-273\" srcset=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2020\/04\/ssh-180423135743-thumbnail-4.jpg 543w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2020\/04\/ssh-180423135743-thumbnail-4-300x149.jpg 300w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2020\/04\/ssh-180423135743-thumbnail-4-150x74.jpg 150w\" sizes=\"auto, (max-width: 543px) 100vw, 543px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">Prerequisites<\/h4>\n\n\n\n<p>Before proceeding, ensure you have the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A <strong>CentOS 7 server<\/strong><\/li>\n\n\n\n<li><strong>Root or sudo privileges<\/strong><\/li>\n\n\n\n<li>Basic knowledge of Linux command line<\/li>\n\n\n\n<li>SSH access to your server<\/li>\n\n\n\n<li>SELinux and firewall enabled (recommended)<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Implementation<\/h4>\n\n\n\n<p>Follow the steps below to secure your SSH server:<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">1.Disable Root Logins:<\/h4>\n\n\n\n<p>For security concern, it is not recommended to use root user to login via SSH over a network.<\/p>\n\n\n\n<p>To disable root login via SSH, update file&nbsp;\/etc\/ssh\/sshd_config&nbsp;and restart SSH service as the following.<\/p>\n\n\n\n<p><em>#vim \/etc\/ssh\/sshd_config<\/em><br><em>PermitRootLogin no<\/em><br><em>#systemctl restart sshd<\/em><\/p>\n\n\n\n<p>We will get a deny when trying SSH access with root user to the server.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"884\" height=\"162\" src=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2020\/03\/root-login-failed.png\" alt=\"\" class=\"wp-image-184\" style=\"width:755px;height:138px\" srcset=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2020\/03\/root-login-failed.png 884w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2020\/03\/root-login-failed-300x55.png 300w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2020\/03\/root-login-failed-768x141.png 768w, https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2020\/03\/root-login-failed-150x27.png 150w\" sizes=\"auto, (max-width: 884px) 100vw, 884px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">2.Limit User Logins:<\/h4>\n\n\n\n<p>By default, all valid users on the system are able to access the server. For security reason, we should limit to only certain users who really need to have SSH access to the server.<\/p>\n\n\n\n<p>Add the parameter&nbsp;AllowUsers&nbsp;followed by a space-separated list of usernames to file&nbsp;\/etc\/ssh\/sshd_config.<\/p>\n\n\n\n<p><em>$sudo vim \/etc\/ssh\/sshd_config<\/em><br><em>AllowUsers&nbsp; <\/em>username1 username2<br><em>$sudo systemctl restart sshd<\/em><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">3.Disable Protocol 1:<\/h4>\n\n\n\n<p>Using protocol 1 of SSH is less secure. We should be disabled and always use protocol 2 only instead. Edit file&nbsp;\/etc\/ssh\/sshd_config&nbsp;and restart SSH service as the following.<\/p>\n\n\n\n<p><em>$sudo vim \/etc\/ssh\/sshd_config<\/em><br><em>Protocol 2<\/em><br><em>$sudo systemctl restart sshd<\/em><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">4. Change Default Port:<\/h4>\n\n\n\n<p>Port 22 is the default SSH listens port for incoming connections. The hacker can constantly be scanning the server for port 22.<\/p>\n\n\n\n<p>We can change the default SSH port, for example to port 2222 to eliminate this attacks as the following.<\/p>\n\n\n\n<p><em>$sudo vim \/etc\/ssh\/sshd_config<\/em><br><em>Port 222<\/em>2<\/p>\n\n\n\n<p>Now we need to check SELinux what ports sshd is allowed to listen by using the following command.<\/p>\n\n\n\n<p><em>$sudo semanage port -l | grep ssh<\/em><br><em>ssh_port_t&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; tcp&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 22<\/em><\/p>\n\n\n\n<p>To allow sshd to listen on the new port 2223 we have to add a rule to SELinux and restart SSH service as the following.<\/p>\n\n\n\n<p><em>$sudo semanage port -a -t ssh_port_t -p tcp 2223<\/em><br><em>$sudo&nbsp;systemctl restart sshd<\/em><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">5. Limit Access With Firewall:<\/h4>\n\n\n\n<p>For security enhancement, we should filter the connections with the firewall by adding a firewall rule in IPTables to limit access on the changed port 2222 to only an authorized IP address and Edit file&nbsp;\/etc\/sysconfig\/iptables&nbsp;and restart IPTable service as the following.<\/p>\n\n\n\n<p><em>$sudo vim \/etc\/sysconfig\/iptables<\/em><br><em>-A INPUT -p tcp -m state \u2013state NEW -m tcp -s 192.168.10.0\/24 \u2013dport 2222 -j ACCEPT<\/em><br><em>$sudo systemctl restart iptables<\/em><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">6.Limit Idle Timeout Interval:<\/h4>\n\n\n\n<p>In many cases, people stay away from their computers without locking the screens and SSH is still connected to the server and Edit file&nbsp;\/etc\/ssh\/sshd_config&nbsp;as the following. The timeout interval is in seconds.&nbsp; So let set it to 300 seconds to have 5 minutes idle timeout.<\/p>\n\n\n\n<p><em>$sudo vim \/etc\/ssh\/sshd_config<\/em><br><em>ClientAliveInterval 300<\/em><br><em>ClientAliveCountMax 0<\/em><br><em>$sudo systemctl restart sshd<\/em><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">7. Limit Maximum Fail Authentication:<\/h4>\n\n\n\n<p>Limiting a maximum fail authentication with SSH is a good method to stop the password brute-forcing attacks. If a user inputs the password incorrectly for N-1 times of the limited N time, the SSH remote session will be disconnected and will have to reconnect again. In the below configuration, when the user incorrectly inputs the password for times, the remote session will be disconnected.<\/p>\n\n\n\n<p><em>$sudo vim \/etc\/ssh\/sshd_config<\/em><br><em>MaxAuthTries 5<\/em><br><em>$sudo systemctl restart sshd<\/em><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">8. Limit Listen Address:<\/h4>\n\n\n\n<p>The default configuration of SSH will listen on all available interfaces which should be limited. If there are multiple interfaces on the server configured with different IP addresses, it is always best to limit the user to login to the server using the management IP address only.<\/p>\n\n\n\n<p><em>$sudo vim \/etc\/ssh\/sshd_config<\/em><br><em>ListenAddress 192.168.1<\/em>.100<br><em>$sudo systemctl restart sshd<\/em><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">9: Disable Empty Passwords Access:<\/h4>\n\n\n\n<p>The user account on the server might not have set a password or has an empty password. It is best to always disable these users connecting with a remote SSH server.<\/p>\n\n\n\n<p><em>$sudo vim \/etc\/ssh\/sshd_config<\/em><br><em>PermitEmptyPasswords no<\/em><br><em>$sudo systemctl restart sshd<\/em><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">10. Disable Host-Based Authentication:<\/h4>\n\n\n\n<p>Host-based authentication allows hosts to authenticate on behalf of all or some of the users using the public key.<\/p>\n\n\n\n<p><em>$sudo vim \/etc\/ssh\/sshd_config<\/em><br><em>HostbasedAuthentication no<\/em><br><em>$sudo systemctl restart sshd<\/em><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">11. Reduce Login Grace Time:<\/h4>\n\n\n\n<p>When we try to remote SSH a server, the default configuration will us 2 minutes to log in. If we do not do anything or cannot successfully login within 2 minutes, the SSH session will be disconnected. The default 2 minutes&#8217; time to log in successfully is too much. we should consider reducing it to 1 minute instead.<\/p>\n\n\n\n<p><em>$sudo vim \/etc\/ssh\/sshd_config<\/em><br><em>LoginGraceTime 1m<\/em><br><em>$sudo systemctl restart sshd<\/em><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">12: Reduce Maximum Start Up Connection:<\/h4>\n\n\n\n<p>Reducing the maximum number of concurrent connections to the SSH daemon can be helpful against a brute-force attack. The setting of&nbsp;MaxStartups 4&nbsp;tells the ssh server to allow only 4 users to attempt logging in at the same time.<\/p>\n\n\n\n<p><em>$sudo vim \/etc\/ssh\/sshd_config<\/em><br><em>MaxStartups 4<\/em><br><em>$sudo systemctl restart sshd<\/em><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Conclusion:<\/h4>\n\n\n\n<p>Securing SSH access is a critical step in protecting your CentOS 7 server from unauthorized access and cyber threats. By implementing the configurations outlined above, you significantly reduce the attack surface and improve overall system security.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction: SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network. It provides several alternative options for strong authentication, and it protects the communications security and integrity with strong encryption. Prerequisites Before proceeding, ensure ..<\/p>\n<div class=\"clear-fix\"><\/div>\n<p><a href=\"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/27\/how-to-secure-ssh-access-on-centos-7\/\" title=\"read more...\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[9],"class_list":["post-183","post","type-post","status-publish","format-standard","hentry","category-dedicated-hosting","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Secure SSH Access on CentOS 7 - PheonixSolutions Knowledge-Base<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/27\/how-to-secure-ssh-access-on-centos-7\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Secure SSH Access on CentOS 7 - PheonixSolutions Knowledge-Base\" \/>\n<meta property=\"og:description\" content=\"Introduction: SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network. It provides several alternative options for strong authentication, and it protects the communications security and integrity with strong encryption. Prerequisites Before proceeding, ensure ..Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/27\/how-to-secure-ssh-access-on-centos-7\/\" \/>\n<meta property=\"og:site_name\" content=\"PheonixSolutions Knowledge-Base\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-27T09:27:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-11T11:25:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2020\/04\/ssh-180423135743-thumbnail-4.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"543\" \/>\n\t<meta property=\"og:image:height\" content=\"269\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"knowledge-base\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"knowledge-base\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2020\\\/04\\\/27\\\/how-to-secure-ssh-access-on-centos-7\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2020\\\/04\\\/27\\\/how-to-secure-ssh-access-on-centos-7\\\/\"},\"author\":{\"name\":\"knowledge-base\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#\\\/schema\\\/person\\\/24ddfd756e23cf1ce3c8e5f0fb309e6b\"},\"headline\":\"How to Secure SSH Access on CentOS 7\",\"datePublished\":\"2020-04-27T09:27:43+00:00\",\"dateModified\":\"2026-04-11T11:25:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2020\\\/04\\\/27\\\/how-to-secure-ssh-access-on-centos-7\\\/\"},\"wordCount\":945,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2020\\\/04\\\/27\\\/how-to-secure-ssh-access-on-centos-7\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/ssh-180423135743-thumbnail-4.jpg\",\"keywords\":[\"Security\"],\"articleSection\":[\"Dedicated Hosting\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2020\\\/04\\\/27\\\/how-to-secure-ssh-access-on-centos-7\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2020\\\/04\\\/27\\\/how-to-secure-ssh-access-on-centos-7\\\/\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2020\\\/04\\\/27\\\/how-to-secure-ssh-access-on-centos-7\\\/\",\"name\":\"How to Secure SSH Access on CentOS 7 - PheonixSolutions Knowledge-Base\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2020\\\/04\\\/27\\\/how-to-secure-ssh-access-on-centos-7\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2020\\\/04\\\/27\\\/how-to-secure-ssh-access-on-centos-7\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/ssh-180423135743-thumbnail-4.jpg\",\"datePublished\":\"2020-04-27T09:27:43+00:00\",\"dateModified\":\"2026-04-11T11:25:55+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#\\\/schema\\\/person\\\/24ddfd756e23cf1ce3c8e5f0fb309e6b\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2020\\\/04\\\/27\\\/how-to-secure-ssh-access-on-centos-7\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2020\\\/04\\\/27\\\/how-to-secure-ssh-access-on-centos-7\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2020\\\/04\\\/27\\\/how-to-secure-ssh-access-on-centos-7\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/ssh-180423135743-thumbnail-4.jpg\",\"contentUrl\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/ssh-180423135743-thumbnail-4.jpg\",\"width\":543,\"height\":269},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/2020\\\/04\\\/27\\\/how-to-secure-ssh-access-on-centos-7\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Secure SSH Access on CentOS 7\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#website\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/\",\"name\":\"PheonixSolutions Knowledge-Base\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/#\\\/schema\\\/person\\\/24ddfd756e23cf1ce3c8e5f0fb309e6b\",\"name\":\"knowledge-base\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7203df2304073f631b2bf04267130cc48b8b1a82bb0ec98285125d6bc3cb8ade?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7203df2304073f631b2bf04267130cc48b8b1a82bb0ec98285125d6bc3cb8ade?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7203df2304073f631b2bf04267130cc48b8b1a82bb0ec98285125d6bc3cb8ade?s=96&d=mm&r=g\",\"caption\":\"knowledge-base\"},\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/knowledge-base\\\/author\\\/knowledge-base\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Secure SSH Access on CentOS 7 - PheonixSolutions Knowledge-Base","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/27\/how-to-secure-ssh-access-on-centos-7\/","og_locale":"en_US","og_type":"article","og_title":"How to Secure SSH Access on CentOS 7 - PheonixSolutions Knowledge-Base","og_description":"Introduction: SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network. It provides several alternative options for strong authentication, and it protects the communications security and integrity with strong encryption. Prerequisites Before proceeding, ensure ..Read more","og_url":"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/27\/how-to-secure-ssh-access-on-centos-7\/","og_site_name":"PheonixSolutions Knowledge-Base","article_published_time":"2020-04-27T09:27:43+00:00","article_modified_time":"2026-04-11T11:25:55+00:00","og_image":[{"width":543,"height":269,"url":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2020\/04\/ssh-180423135743-thumbnail-4.jpg","type":"image\/jpeg"}],"author":"knowledge-base","twitter_card":"summary_large_image","twitter_misc":{"Written by":"knowledge-base","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/27\/how-to-secure-ssh-access-on-centos-7\/#article","isPartOf":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/27\/how-to-secure-ssh-access-on-centos-7\/"},"author":{"name":"knowledge-base","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#\/schema\/person\/24ddfd756e23cf1ce3c8e5f0fb309e6b"},"headline":"How to Secure SSH Access on CentOS 7","datePublished":"2020-04-27T09:27:43+00:00","dateModified":"2026-04-11T11:25:55+00:00","mainEntityOfPage":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/27\/how-to-secure-ssh-access-on-centos-7\/"},"wordCount":945,"commentCount":0,"image":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/27\/how-to-secure-ssh-access-on-centos-7\/#primaryimage"},"thumbnailUrl":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2020\/04\/ssh-180423135743-thumbnail-4.jpg","keywords":["Security"],"articleSection":["Dedicated Hosting"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/27\/how-to-secure-ssh-access-on-centos-7\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/27\/how-to-secure-ssh-access-on-centos-7\/","url":"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/27\/how-to-secure-ssh-access-on-centos-7\/","name":"How to Secure SSH Access on CentOS 7 - PheonixSolutions Knowledge-Base","isPartOf":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/27\/how-to-secure-ssh-access-on-centos-7\/#primaryimage"},"image":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/27\/how-to-secure-ssh-access-on-centos-7\/#primaryimage"},"thumbnailUrl":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2020\/04\/ssh-180423135743-thumbnail-4.jpg","datePublished":"2020-04-27T09:27:43+00:00","dateModified":"2026-04-11T11:25:55+00:00","author":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#\/schema\/person\/24ddfd756e23cf1ce3c8e5f0fb309e6b"},"breadcrumb":{"@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/27\/how-to-secure-ssh-access-on-centos-7\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/27\/how-to-secure-ssh-access-on-centos-7\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/27\/how-to-secure-ssh-access-on-centos-7\/#primaryimage","url":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2020\/04\/ssh-180423135743-thumbnail-4.jpg","contentUrl":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-content\/uploads\/2020\/04\/ssh-180423135743-thumbnail-4.jpg","width":543,"height":269},{"@type":"BreadcrumbList","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/2020\/04\/27\/how-to-secure-ssh-access-on-centos-7\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pheonixsolutions.com\/knowledge-base\/"},{"@type":"ListItem","position":2,"name":"How to Secure SSH Access on CentOS 7"}]},{"@type":"WebSite","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#website","url":"https:\/\/pheonixsolutions.com\/knowledge-base\/","name":"PheonixSolutions Knowledge-Base","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pheonixsolutions.com\/knowledge-base\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/pheonixsolutions.com\/knowledge-base\/#\/schema\/person\/24ddfd756e23cf1ce3c8e5f0fb309e6b","name":"knowledge-base","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7203df2304073f631b2bf04267130cc48b8b1a82bb0ec98285125d6bc3cb8ade?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7203df2304073f631b2bf04267130cc48b8b1a82bb0ec98285125d6bc3cb8ade?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7203df2304073f631b2bf04267130cc48b8b1a82bb0ec98285125d6bc3cb8ade?s=96&d=mm&r=g","caption":"knowledge-base"},"url":"https:\/\/pheonixsolutions.com\/knowledge-base\/author\/knowledge-base\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/posts\/183","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/comments?post=183"}],"version-history":[{"count":13,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/posts\/183\/revisions"}],"predecessor-version":[{"id":3286,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/posts\/183\/revisions\/3286"}],"wp:attachment":[{"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/media?parent=183"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/categories?post=183"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pheonixsolutions.com\/knowledge-base\/wp-json\/wp\/v2\/tags?post=183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}