Implementing Zero Trust Model for SSH Security with kerberos and OpenLDAP
In order to remove trust presumptions towards the internal network, this study addresses the use of the Zero Trust Model in SSH (Secure Shell) security. The study approach is conducting tests by incorporating the Kerberos and OpenLDAP protocols into the SSH infrastructure. While OpenLDAP acts as a c...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | Indonesian |
Published: |
Islamic University of Indragiri
2023-09-01
|
Series: | Sistemasi: Jurnal Sistem Informasi |
Online Access: | http://sistemasi.ftik.unisi.ac.id/index.php/stmsi/article/view/3330 |
_version_ | 1797661827280142336 |
---|---|
author | Salwa Deta Mediana lindawati lindawati Mohammad Fadhli |
author_facet | Salwa Deta Mediana lindawati lindawati Mohammad Fadhli |
author_sort | Salwa Deta Mediana |
collection | DOAJ |
description | In order to remove trust presumptions towards the internal network, this study addresses the use of the Zero Trust Model in SSH (Secure Shell) security. The study approach is conducting tests by incorporating the Kerberos and OpenLDAP protocols into the SSH infrastructure. While OpenLDAP acts as a central directory for user management and permission access, Kerberos is utilized for single authentication and security resources like Kerberos tickets. As the server operating system for this investigation, Debian was used. Strong justification exists for securing SSH with Kerberos and OpenLDAP. SSH protocol assaults commonly target the standard port 22 (SSH), which is used for SSH. To ensure the security and integrity of the server system, the SSH port must be protected with Kerberos and OpenLDAP. SSH access is limited by Kerberos single authentication, which lowers the possibility of brute-force assaults and password theft. User administration and authorisation are facilitated by the integration of OpenLDAP. Implementing the Zero Trust strategy enables strong authentication and defends the system from insider threats. The system is protected from internal and external network assaults thanks to robust authentication, accurate authorisation, and isolating internal and external networks. An essential step in maintaining the security of the server system, data integrity, and information confidentiality is to secure port 22 and improve SSH with this integration. The research findings show that applying the Zero Trust model through this protocol integration greatly improves system security, resulting in better authentication and authorisation. |
first_indexed | 2024-03-11T18:51:20Z |
format | Article |
id | doaj.art-10ae2433b6f64ff19864e56e1cf0a719 |
institution | Directory Open Access Journal |
issn | 2302-8149 2540-9719 |
language | Indonesian |
last_indexed | 2024-03-11T18:51:20Z |
publishDate | 2023-09-01 |
publisher | Islamic University of Indragiri |
record_format | Article |
series | Sistemasi: Jurnal Sistem Informasi |
spelling | doaj.art-10ae2433b6f64ff19864e56e1cf0a7192023-10-11T09:36:28ZindIslamic University of IndragiriSistemasi: Jurnal Sistem Informasi2302-81492540-97192023-09-0112398199510.32520/stmsi.v12i3.3330637Implementing Zero Trust Model for SSH Security with kerberos and OpenLDAPSalwa Deta Mediana0lindawati lindawati1Mohammad Fadhli2Politeknik Negeri SriwijayaPoliteknik Negeri SriwijayaPoliteknik Negeri SriwijayaIn order to remove trust presumptions towards the internal network, this study addresses the use of the Zero Trust Model in SSH (Secure Shell) security. The study approach is conducting tests by incorporating the Kerberos and OpenLDAP protocols into the SSH infrastructure. While OpenLDAP acts as a central directory for user management and permission access, Kerberos is utilized for single authentication and security resources like Kerberos tickets. As the server operating system for this investigation, Debian was used. Strong justification exists for securing SSH with Kerberos and OpenLDAP. SSH protocol assaults commonly target the standard port 22 (SSH), which is used for SSH. To ensure the security and integrity of the server system, the SSH port must be protected with Kerberos and OpenLDAP. SSH access is limited by Kerberos single authentication, which lowers the possibility of brute-force assaults and password theft. User administration and authorisation are facilitated by the integration of OpenLDAP. Implementing the Zero Trust strategy enables strong authentication and defends the system from insider threats. The system is protected from internal and external network assaults thanks to robust authentication, accurate authorisation, and isolating internal and external networks. An essential step in maintaining the security of the server system, data integrity, and information confidentiality is to secure port 22 and improve SSH with this integration. The research findings show that applying the Zero Trust model through this protocol integration greatly improves system security, resulting in better authentication and authorisation.http://sistemasi.ftik.unisi.ac.id/index.php/stmsi/article/view/3330 |
spellingShingle | Salwa Deta Mediana lindawati lindawati Mohammad Fadhli Implementing Zero Trust Model for SSH Security with kerberos and OpenLDAP Sistemasi: Jurnal Sistem Informasi |
title | Implementing Zero Trust Model for SSH Security with kerberos and OpenLDAP |
title_full | Implementing Zero Trust Model for SSH Security with kerberos and OpenLDAP |
title_fullStr | Implementing Zero Trust Model for SSH Security with kerberos and OpenLDAP |
title_full_unstemmed | Implementing Zero Trust Model for SSH Security with kerberos and OpenLDAP |
title_short | Implementing Zero Trust Model for SSH Security with kerberos and OpenLDAP |
title_sort | implementing zero trust model for ssh security with kerberos and openldap |
url | http://sistemasi.ftik.unisi.ac.id/index.php/stmsi/article/view/3330 |
work_keys_str_mv | AT salwadetamediana implementingzerotrustmodelforsshsecuritywithkerberosandopenldap AT lindawatilindawati implementingzerotrustmodelforsshsecuritywithkerberosandopenldap AT mohammadfadhli implementingzerotrustmodelforsshsecuritywithkerberosandopenldap |