My notes and thoughts on how I setup a trusted user for remote SSH logins

Note about zero-trust: Zero Trust security is an IT security model that requires strict identity verification for every person and device trying to access resources, regardless of whether they are sitting within or outside of the network perimeter.

The following procedure uses Bitwarden Premium to generate and store the user credentials.

These notes describe procedures that have worked for me in the past. They may or may not be suited for you to use in your environment. I limit my liablity to the amount of money you paid me to read and copy my notes.

Thanks!

Bob Glidewell