{"id":14192,"date":"2025-12-27T12:25:05","date_gmt":"2025-12-27T06:55:05","guid":{"rendered":"https:\/\/www.youstable.com\/blog\/?p=14192"},"modified":"2025-12-27T12:25:07","modified_gmt":"2025-12-27T06:55:07","slug":"create-ssh-on-linux","status":"publish","type":"post","link":"https:\/\/www.youstable.com\/blog\/create-ssh-on-linux","title":{"rendered":"How to Create SSH on Linux Server in 2026? &#8211; (Step by Step Guide)"},"content":{"rendered":"\n<p><strong>To create SSH on a Linux server<\/strong>, install the OpenSSH server package, start and enable the sshd service, allow SSH in your firewall, create a non-root sudo user, generate an SSH key pair on your local machine, copy the public key to the server, and harden sshd_config by disabling root and password logins.<\/p>\n\n\n\n<p>Secure Shell <strong>(SSH)<\/strong> lets you securely administer your Linux server from anywhere. In this guide, you\u2019ll learn how to create SSH on a Linux server step-by-step: installing OpenSSH, opening firewalls, configuring key based authentication, and hardening sshd for production. <\/p>\n\n\n\n<p>]Whether you\u2019re on Ubuntu, CentOS, Rocky, AlmaLinux, Debian, or Fedora, this walkthrough has you covered.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"what-is-ssh-and-why-it-matters\"><strong>What is SSH and Why it Matters<\/strong>?<\/h2>\n\n\n\n<p>SSH <strong>(Secure Shell)<\/strong> is a cryptographic protocol used to securely access and manage servers over an encrypted connection. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"533\" src=\"https:\/\/www.youstable.com\/blog\/wp-content\/uploads\/2025\/12\/image-110.png\" alt=\"Create SSH on Linux Server\" class=\"wp-image-14555\" srcset=\"https:\/\/www.youstable.com\/blog\/wp-content\/uploads\/2025\/12\/image-110.png 800w, https:\/\/www.youstable.com\/blog\/wp-content\/uploads\/2025\/12\/image-110-150x100.png 150w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<p>It\u2019s the backbone of server administration, automation, Git deployments, SFTP file transfers, and remote troubleshooting. The default SSH server on Linux is OpenSSH, known for stability, performance, and robust security features.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"prerequisites\"><strong>Prerequisites<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A Linux server (Ubuntu\/Debian, CentOS\/RHEL\/Rocky\/AlmaLinux, or Fedora)<\/li>\n\n\n\n<li>Root or sudo access<\/li>\n\n\n\n<li>Server public IP or hostname<\/li>\n\n\n\n<li>A local terminal (Linux\/macOS) or PowerShell on Windows 10\/11 (OpenSSH installed), or PuTTY<\/li>\n\n\n\n<li>Firewall access (UFW, firewalld, or security group rules if using cloud)<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"install-and-enable-openssh-server\"><strong>Install and Enable OpenSSH Server<\/strong><\/h2>\n\n\n\n<p>First, install the OpenSSH server package and enable the service so it starts at boot. Commands vary slightly by distribution.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"ubuntu-debian\"><strong>Ubuntu\/Debian<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo apt update\nsudo apt install -y openssh-server\nsudo systemctl enable --now ssh\nsudo systemctl status ssh<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"rhel-centos-rocky-almalinux\"><strong>RHEL\/CentOS\/Rocky\/AlmaLinux<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo dnf install -y openssh-server\nsudo systemctl enable --now sshd\nsudo systemctl status sshd<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"fedora\"><strong>Fedora<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo dnf install -y openssh-server\nsudo systemctl enable --now sshd\nsudo systemctl status sshd<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"suse-opensuse\"><strong>SUSE\/OpenSUSE<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo zypper install -y openssh\nsudo systemctl enable --now sshd\nsudo systemctl status sshd<\/code><\/pre>\n\n\n\n<p><strong>Verify SSH is listening on port 22:<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo ss -tlnp | grep -E '22|ssh'<\/code><\/pre>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"allow-ssh-in-the-firewall\"><strong>Allow SSH in the Firewall<\/strong><\/h2>\n\n\n\n<p>If you use a host firewall or cloud security group, you must allow inbound TCP traffic on your SSH port (default 22).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"ufw-ubuntu-debian\"><strong>UFW (Ubuntu\/Debian)<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo ufw allow OpenSSH\nsudo ufw enable\nsudo ufw status<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"firewalld-rhel-centos-rocky-alma-fedora\"><strong>firewalld (RHEL\/CentOS\/Rocky\/Alma\/Fedora)<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo firewall-cmd --permanent --add-service=ssh\nsudo firewall-cmd --reload\nsudo firewall-cmd --list-all<\/code><\/pre>\n\n\n\n<p><strong>If you changed the SSH port, allow it explicitly, e.g. 2222:<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># UFW\nsudo ufw allow 2222\/tcp\n\n# firewalld\nsudo firewall-cmd --permanent --add-port=2222\/tcp\nsudo firewall-cmd --reload<\/code><\/pre>\n\n\n\n<p>Cloud platforms (AWS, GCP, Azure) require security group or firewall rule changes as well. Allow your SSH port from trusted IPs whenever possible.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"create-a-non-root-user-and-grant-sudo\"><strong>Create a Non\u2011Root User and Grant Sudo<\/strong><\/h3>\n\n\n\n<p>Never manage servers over SSH as root. Create a non-root user and provide sudo privileges.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># Create user and set password\nsudo adduser deploy\n\n# Add to sudoers (Ubuntu\/Debian)\nsudo usermod -aG sudo deploy\n\n# Add to wheel group (RHEL-based)\nsudo usermod -aG wheel deploy<\/code><\/pre>\n\n\n\n<p>Test local login over SSH (with passwords still enabled at this step):<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ssh deploy@your_server_ip<\/code><\/pre>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"set-up-ssh-key-based-authentication\"><strong>Set Up SSH Key Based Authentication<\/strong><\/h2>\n\n\n\n<p>Key-based auth is more secure and faster than passwords. Generate a key pair on your local machine and install the public key on the server.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"generate-a-modern-ssh-key-local-machine\"><strong>Generate a modern SSH key (local machine)<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code># Recommended: Ed25519\nssh-keygen -t ed25519 -C \"your_email@example.com\"\n\n# Fallback for legacy systems:\nssh-keygen -t rsa -b 4096 -C \"your_email@example.com\"<\/code><\/pre>\n\n\n\n<p>Accept defaults to save the key in ~\/.ssh and set a strong passphrase for added security. Then copy your public key to the server.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"install-your-public-key-on-the-server\"><strong>Install your public key on the server<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code># Easiest method\nssh-copy-id deploy@your_server_ip\n\n# Manual method (if ssh-copy-id is unavailable)\ncat ~\/.ssh\/id_ed25519.pub | ssh deploy@your_server_ip \"mkdir -p ~\/.ssh &amp;&amp; chmod 700 ~\/.ssh &amp;&amp; cat &gt;&gt; ~\/.ssh\/authorized_keys &amp;&amp; chmod 600 ~\/.ssh\/authorized_keys\"<\/code><\/pre>\n\n\n\n<p><strong>Test key-based login:<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ssh deploy@your_server_ip -i ~\/.ssh\/id_ed25519<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"harden-sshd_config-for-production\"><strong>Harden sshd_config for Production<\/strong><\/h2>\n\n\n\n<p>Edit the SSH daemon configuration to reduce attack surface. Always keep an existing session open while testing changes so you don\u2019t lock yourself out.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo cp \/etc\/ssh\/sshd_config \/etc\/ssh\/sshd_config.bak\nsudo nano \/etc\/ssh\/sshd_config<\/code><\/pre>\n\n\n\n<p><strong>Recommended settings:<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># Change default port (optional but helpful against noise)\nPort 22\n\n# Disable root login\nPermitRootLogin no\n\n# Only use keys\nPasswordAuthentication no\nKbdInteractiveAuthentication no\nChallengeResponseAuthentication no\nPubkeyAuthentication yes\n\n# Limit users (adjust to your usernames)\nAllowUsers deploy\n\n# Reduce brute force window\nMaxAuthTries 3\nLoginGraceTime 30\n\n# Keep connections reliable\nClientAliveInterval 120\nClientAliveCountMax 2\n\n# Keep for compatibility\nUsePAM yes<\/code><\/pre>\n\n\n\n<p>If you change Port 22 to another port (e.g., 2222), update your firewall rules accordingly and connect with the -p flag. Apply changes and validate:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo sshd -t    # syntax check; no output means OK\nsudo systemctl reload sshd || sudo systemctl reload ssh<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"connect-from-windows-macos-and-linux\"><strong>Connect from Windows, macOS, and Linux<\/strong><\/h2>\n\n\n\n<p>On Linux and macOS, use the built-in SSH client. On Windows 10\/11, use PowerShell (OpenSSH) or PuTTY.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># Linux\/macOS\/Windows PowerShell\nssh deploy@your_server_ip -i ~\/.ssh\/id_ed25519\n\n# If you changed the port:\nssh deploy@your_server_ip -p 2222 -i ~\/.ssh\/id_ed25519<\/code><\/pre>\n\n\n\n<p>PuTTY users should import OpenSSH keys via PuTTYgen, set Host Name, Port, and under Connection &gt; SSH &gt; Auth, browse for the .ppk file, then open the session.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"troubleshooting-common-ssh-errors\"><strong>Troubleshooting Common SSH Errors<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Connection refused:<\/strong> sshd not running or firewall blocking. Check with <code>systemctl status sshd<\/code> and firewall rules.<\/li>\n\n\n\n<li><strong>Connection timed out:<\/strong> network route or cloud security group not allowing port. Verify provider rules.<\/li>\n\n\n\n<li><strong>Permission denied (publickey):<\/strong> wrong key, wrong user, or file permissions. Ensure <code>~\/.ssh<\/code> is 700 and <code>authorized_keys<\/code> is 600.<\/li>\n\n\n\n<li><strong>Too many authentication failures:<\/strong> limit SSH agent keys or use <code>ssh -o IdentitiesOnly=yes -i ~\/.ssh\/id_ed25519<\/code>.<\/li>\n\n\n\n<li><strong>HOST IDENTIFICATION HAS CHANGED!: <\/strong>server\u2019s host key changed (rebuild or IP reassignment). Verify and remove old entry with <code>ssh-keygen -R your_server_ip<\/code> before reconnecting.<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code># Logs and checks\nsudo journalctl -u ssh -e --no-pager\nsudo journalctl -u sshd -e --no-pager\nsudo tail -f \/var\/log\/auth.log   # Debian\/Ubuntu\nsudo tail -f \/var\/log\/secure     # RHEL-based\n\n# Confirm listening and firewall\nsudo ss -tlnp | grep ssh\nsudo iptables -S | grep 22\nsudo firewall-cmd --list-all\nsudo ufw status<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"quality-of-life-tips-and-advanced-security\"><strong>Quality-of-Life Tips and Advanced Security<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>SSH config file (client):<\/strong> Create shortcuts and defaults in <code>~\/.ssh\/config<\/code>.<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>Host myserver\n    HostName your_server_ip\n    User deploy\n    Port 2222\n    IdentityFile ~\/.ssh\/id_ed25519\n    IdentitiesOnly yes<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Fail2ban:<\/strong> Ban IPs after repeated failures to mitigate brute force attempts.<\/li>\n\n\n\n<li><strong>Two-factor auth (2FA):<\/strong> Combine <a href=\"https:\/\/www.youstable.com\/blog\/how-to-add-ssh-keys-to-github-account\/\">SSH keys<\/a> with TOTP using <code>libpam-google-authenticator<\/code> for high-security environments.<\/li>\n\n\n\n<li>Disable SSH agent forwarding unless needed; never forward from untrusted hosts.<\/li>\n\n\n\n<li>Use a bastion host and <code>ProxyJump<\/code> for private networks: <code>ssh -J bastion user@internal-host<\/code>.<\/li>\n\n\n\n<li><strong>Patch regularly:<\/strong> <code>sudo apt upgrade<\/code> or <code>sudo dnf upgrade<\/code> keeps OpenSSH and dependencies secure.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"why-hosting-choice-matters-and-how-youstable-helps\"><strong>Why Hosting Choice Matters (and How YouStable Helps)<\/strong><\/h2>\n\n\n\n<p>Reliable SSH access depends on stable networks, clean IP reputation, and sane defaults. <a href=\"https:\/\/www.youstable.com\/blog\/advantages-of-dedicated-server\/\">YouStable\u2019s SSD-powered VPS and dedicated servers<\/a> ship with current kernels, optional pre-hardened images, and full root control, making it easy to enable SSH, enforce key-only auth, and scale safely. Need help? Our engineers can <a href=\"https:\/\/www.youstable.com\/blog\/how-to-monitor-secure-ssh-on-linux-server\/\">guide secure SSH<\/a> setups without upselling or gimmicks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"step-by-step-recap\"><strong>Step-by-Step Recap<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Install OpenSSH server and enable sshd.<\/li>\n\n\n\n<li>Allow SSH in UFW\/firewalld and cloud security groups.<\/li>\n\n\n\n<li>Create a non-root sudo user.<\/li>\n\n\n\n<li>Generate SSH keys locally; copy the public key to the server.<\/li>\n\n\n\n<li>Harden <code>\/etc\/ssh\/sshd_config<\/code>: disable root and password logins, consider custom port, limit users.<\/li>\n\n\n\n<li>Test access and keep a backup session open when changing configs.<\/li>\n\n\n\n<li>Add defense-in-depth: Fail2ban, 2FA, regular patching.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"faqs\"><strong>FAQ&#8217;s<\/strong><\/h2>\n\n\n<div id=\"rank-math-faq\" class=\"rank-math-block\">\n<div class=\"rank-math-list \">\n<div id=\"faq-question-1765956033902\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"1-how-do-i-enable-ssh-on-ubuntu\"><strong>1. How do I enable SSH on Ubuntu?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Run <code>sudo apt update &amp;&amp; sudo apt install -y openssh-server<\/code>, then <code>sudo systemctl enable --now ssh<\/code>. Allow the firewall with <code>sudo ufw allow OpenSSH<\/code>. Connect using <code>ssh username@server_ip<\/code>. For best security, set up key-based authentication and disable passwords in sshd_config.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1765956065311\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"2-what-port-should-ssh-use\"><strong>2. What port should SSH use?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>SSH defaults to port 22. Changing the port (e.g., 2222) reduces noise from automated scans but isn\u2019t a security cure-all. If you change it, update firewall rules and your client command: <code>ssh user@server -p 2222<\/code>. Always pair with key-only auth and lock down allowed users.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1765956077553\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"3-which-ssh-key-type-is-best-ed25519-or-rsa\"><strong>3. Which SSH key type is best: Ed25519 or RSA?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Use Ed25519 for modern systems: it\u2019s secure and fast with small keys. RSA 4096 is a compatible fallback for legacy environments. Generate keys with <code>ssh-keygen -t ed25519<\/code> or <code>ssh-keygen -t rsa -b 4096<\/code> and secure them with a passphrase.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1765956086217\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"4-how-do-i-fix-permission-denied-publickey\"><strong>4. How do I fix \u201cPermission denied (publickey)\u201d?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Ensure the correct key is used (<code>-i ~\/.ssh\/id_ed25519<\/code>), file permissions are correct (<code>~\/.ssh 700<\/code>, <code>authorized_keys 600<\/code>), and the public key matches the private key. Check server logs (<code>auth.log<\/code> or <code>secure<\/code>) and confirm <code>PubkeyAuthentication yes<\/code> in sshd_config.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1765956097573\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \" class=\"rank-math-question \" id=\"5-is-disabling-password-logins-safe-for-beginners\"><strong>5. Is disabling password logins safe for beginners?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Yes, once key-based login is verified. Keep one SSH session open while reloading sshd. If you lose access, use your provider\u2019s console (VNC\/serial) to revert changes. Managed hosts like YouStable can help you implement key-only SSH with proper rollback procedures.<\/p>\n<p>By following these steps, you\u2019ve successfully created SSH access on your Linux server, secured it with keys, and applied practical hardening. Keep your system updated, monitor logs, and consider protective layers like Fail2ban and 2FA for a resilient production setup.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>To create SSH on a Linux server, install the OpenSSH server package, start and enable the sshd service, allow SSH [&hellip;]<\/p>\n","protected":false},"author":21,"featured_media":16372,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[350],"tags":[],"class_list":["post-14192","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebase"],"acf":[],"featured_image_src":"https:\/\/www.youstable.com\/blog\/wp-content\/uploads\/2025\/12\/How-to-Create-SSH-on-Linux-Server.jpg","author_info":{"display_name":"Sanjeet Chauhan","author_link":"https:\/\/www.youstable.com\/blog\/author\/sanjeet"},"_links":{"self":[{"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/posts\/14192","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/comments?post=14192"}],"version-history":[{"count":5,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/posts\/14192\/revisions"}],"predecessor-version":[{"id":16374,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/posts\/14192\/revisions\/16374"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/media\/16372"}],"wp:attachment":[{"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/media?parent=14192"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/categories?post=14192"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.youstable.com\/blog\/wp-json\/wp\/v2\/tags?post=14192"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}