BEGIN:VCALENDAR VERSION:2.0 PRODID:-//rssplaylists//Public Agenda//EN CALSCALE:GREGORIAN BEGIN:VEVENT UID:XjeFjKlyr48@tuxdaily.1fm.online DTSTAMP:20260512T161031Z DTSTART:20260602T040000Z DTEND:20260602T050000Z SUMMARY:RHCSA (035): Season 2 - Scenario 10: SSH Permission Matrix DESCRIPTION:Podcast: The RHCSA Series Podcast\nSeason: 2 (Episodes 26A - 50)\nEpisode: 35\nTitle: RHCSA (034): RHCSA (035): Season 2 - Scenario 10: SSH Permission Matrix\nRelease date: June 2\, 2026\nProduced by: Djere Services Group\n\nYou can support my work here: https://www.patreon.com/djere\n\nSeason 1 is complete. We have no Patron tiers\; all Patrons can download the 25 Season 1 mp3s here:\nhttps://www.patreon.com/posts/rhcsa-series-1-138247495\n\n***PRO TIP: NotebookLM sometimes pronounces technical words incorrectly making it hard to understand what it's saying. Opening the associated article and following along as it speaks helps A LOT.***\n\nAssociated article: https://djere.com/rhcsa-035-season-2-scenario-10-ssh-permission-matrix.html\n\nEpisode 035 Executive Summary\n\nIn this SSH Permission Matrix RHCSA lab scenario\, I start performing the lab after a 6 minute introduction by the podcast hosts. You will get the most out of this lab if you listen to the entire show and then try to practice the lab several times\, either along with me or by yourself. We are focusing on the critical intersection of user access and secure remote administration in a Red Hat Enterprise Linux 10 environment.\n\nMany certification candidates understand basic file permissions and SSH access in isolation\, but they often struggle when combining the two under strict security constraints. The deception in this scenario lies in the operational reality that SSH key authentication will completely fail if the underlying directory permissions are too permissive or incorrectly assigned. The goal here is to establish a secure\, key-based access channel for an external auditing account while locking down the local filesystem to prevent unauthorized privilege escalation.\n\nThe core challenge involves creating a dedicated user\, generating SSH keys\, and enforcing exact permission octals on the required security directories. We will use standard user management tools alongside precision chmod and chown commands. Verification will consist of testing the local authentication mechanism directly and inspecting the permission tree to ensure full compliance with OpenSSH daemon security standards. URL:https://www.youtube.com/watch?v=XjeFjKlyr48 END:VEVENT END:VCALENDAR