{"version":"1.0","provider_name":"Eryann Breizh SecOps","provider_url":"https:\/\/eryann.fr","author_name":"wpadmin","author_url":"https:\/\/eryann.fr\/index.php\/author\/wpadmin\/","title":"Fiche SSH : installation et s\u00e9curisation - Eryann Breizh SecOps","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Fcn2t1KNt9\"><a href=\"https:\/\/eryann.fr\/index.php\/linux\/fiche-ssh-installation-et-securisation\/\">Fiche SSH : installation et s\u00e9curisation<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/eryann.fr\/index.php\/linux\/fiche-ssh-installation-et-securisation\/embed\/#?secret=Fcn2t1KNt9\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Fiche SSH : installation et s\u00e9curisation\u00a0\u00bb &#8212; Eryann Breizh SecOps\" data-secret=\"Fcn2t1KNt9\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/eryann.fr\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Pour les \u00e9tudiants en BTS CIEL ou SIO, SSH est un service critique pour l\u2019administration des syst\u00e8mes.Cette fiche propose une configuration renforc\u00e9e conforme aux bonnes pratiques de s\u00e9curit\u00e9 et aux attentes d\u2019un audit type Lynis. Objectifs : Configuration compl\u00e8te SSH s\u00e9curis\u00e9e Explication d\u00e9taill\u00e9e 1. S\u00e9curisation de l\u2019acc\u00e8s 2. Authentification 3. Protection contre attaques 4. Hardening [&hellip;]","thumbnail_url":"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/a666ba9a-5892-4839-8de3-905bd84b3b6d.png","thumbnail_width":1024,"thumbnail_height":1536}