Open main menu

CDOT Wiki β

Changes

Tutorial 1: Using Your Matrix Server Account

133 bytes added, 12:00, 25 August 2020
INVESTIGATION 1: ACCESSING YOUR MATRIX LINUX ACCOUNT
# Click on the '''Search Apps''' area located in the top right corner of the MyApps window and type the word: <span style="color:blue;font-weight:bold">ssh</span><br><br>
# Several SSH applications will appear. <br><br>'''NOTE:''' All of these applications allow you to connect to your Matrix account.<br>We will use the application called '''SSH Secure Shell Client''' for this practice tutorial.<br><br>
# Launch the '''SSH Secure Shell Client''' application icon to launch this program.<br><br>[[Image:quick-connect-window.png|thumb|right|150px|Quick Connect Dialog Box ]]'''NOTETIP:''' Prior to launching the application, you can add this to your '''favourites''' which will make it faster<br>to access this application in the future.<br><br>
# The main SSH Client window will appear. Click on the '''Quick Connect''' button.<br><br>'''NOTE:''' The Connect dialog box allows the user to specify the '''server name''' and your '''account name'''<br>to allow you to connect to the server.<br><br>
# Click on the textbox labelled Hostnanme and enter the text: <span style="color:blue;font-weight:bold">matrix</span><br><br>'''NOTE:''' You can use the hostname '''matrix''' since you are located <u>inside</u> Seneca's network.<br>If you where located <u>outside</u> Seneca's network, then you would need to enter the full domain name: '''matrix.senecac.on.ca'''<br><br>You will be using the latter hostname since you will be connecting to your Matrix account remotely and not within the college.<br><br>[[Image:share-public-key.png|thumb|right|150px|Dialog Box to Share Public Key on Remote Server ]]
# When connecting securely for the '''first time''', a dialog box will appear to share a "public key" with your Matrix account in order to make your interaction between your workstation and the remote Linux server secure within the network (i.e. encrypted to prevent unauthorized access by other users)<br><br>'''FYI:''' To make communications over a network secure, a computer generates '''two keys''': a '''private key''' that is kept on the computer, and a '''public key''', which can be shared with other computers. Transmissions from your computer uses the private key to encrypt (scramble) transmission to the remote computer, which in turn, uses the public key to decrypt (unscramble) the transmission. Likewise, the remote computer uses the public key to encrypt (scramble) transmissions and your computer uses the private key to decrypt (unscramble) those transmissions.<br><br>[[Image:ssh-password-prompt.png|thumb|right|150px|Password Dialog Box ]]
# Click the '''Yes''' button to share your public key.<br><br>
13,420
edits