{"id":5479,"date":"2020-03-30T14:25:57","date_gmt":"2020-03-30T13:25:57","guid":{"rendered":"https:\/\/research.reading.ac.uk\/act\/?post_type=kbe_knowledgebase&#038;p=5479"},"modified":"2020-11-22T17:14:44","modified_gmt":"2020-11-22T17:14:44","slug":"act-ssh-for-linux-and-mac-users-step-by-step-guide","status":"publish","type":"kbe_knowledgebase","link":"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/act-ssh-for-linux-and-mac-users-step-by-step-guide\/","title":{"rendered":"act-ssh for Linux and Mac users &#8211; step by step guide"},"content":{"rendered":"<p>In this article we show a possible approach how to <strong>set up a home Unix machine to connect to campus services via act-ssh<\/strong>. It is similar to <a href=\"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/act-ssh-with-mobaxterm-step-by-step-guide\/\">act-ssh with MobaXterm \u2013 step by step guide\u00a0<\/a>(it might be usefull to read the MobaXterm article for some extra background explanations). However, beyond setting up the ssh keys, this article is targeted at experienced Unix and ssh users. The commands and the configuration file should be treated just as examples and they might need to be modified to work on your machine. This document builds on what is already described in the <a href=\"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/externally-visible-ssh-server\/\">instructions for act-ssh<\/a>, but the goal is to present it as a consistent series of steps, suitable for this particular use case, e.g. we assume that you are working from home, you want to use ssh keys and your openssh version is fairly recent.<\/p>\n<h5>Setting up ssh keys &#8211; this is necessary to connect to act-ssh and quite basic<\/h5>\n<p>We create ssh key pair on the home machine. You can skip this step if you already have the public and private key pair in your ~\/.ssh\/ directory. <strong>We assume that you already have ~\/.ssh\/ directory in your UoR home directory, if not you need to create it<\/strong>. Then we append the public key to the file ~\/.ssh\/authorized_keys in our UoR Unix home directory. If you do not have .ssh\/authorized_keys in your UoR home directory and the first &#8216;scp&#8217; line fails, you can continue with the &#8216;cat&#8217; line, which will create the authorized_keys file if it does not exist. Be careful to not destroy your original authorized_keys file in case if you already have one, and it contains important public ssh keys. <strong>Note that it you specify a non-standard name for you private key, you will need to explicitly provide this name to the ssh command.\u00a0<\/strong> If you have access to VPN, you can also use the simple two line method instead of using MFT, see the <a href=\"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/externally-visible-ssh-server\/\">instructions for act-ssh.<\/a><\/p>\n<pre class=\"lang:default decode:true\">pawel@homepc:~$ ssh-keygen \r\nGenerating public\/private rsa key pair.\r\nEnter file in which to save the key (\/home\/pawel\/.ssh\/id_rsa): \r\nEnter passphrase (empty for no passphrase): \r\nEnter same passphrase again: \r\nYour identification has been saved in \/home\/pawel\/.ssh\/id_rsa.\r\nYour public key has been saved in \/home\/pawel\/.ssh\/id_rsa.pub.\r\nThe key fingerprint is:\r\nSHA256:rAHUFoCc\/pxQddysFMZ8Uf\/I3AhJeMjNeVIj0JrkhsA pawel@homepc\r\nThe key's randomart image is:\r\n+---[RSA 2048]----+\r\n| . oo=o=+=oX+oo  |\r\n|  +.. Eo= O.B+.. |\r\n| . ... o * +oo.  |\r\n|  o  . .o =  + = |\r\n|   + .. S.    = o|\r\n|    +  o         |\r\n|      .          |\r\n|                 |\r\n|                 |\r\n+----[SHA256]-----+\r\npawel@homepc $ scp &lt;UoR user name&gt;@mft.act.reading.ac.uk:\/&lt;UoR user name&gt;\/.ssh\/authorized_keys .\/\r\npawel@homepc $ cat ~\/.ssh\/id_rsa.pub &gt;&gt; authorized_keys\r\npawel@homepc $ scp authorized_keys &lt;UoR user name&gt;@mft.act.reading.ac.uk:\/&lt;UoR user name&gt;\/.ssh\/\r\npawel@homepc $ rm authorized_keys<\/pre>\n<p>Once this is done we can connect to act-ssh.reading.ac.uk on port 2222. We will be authenticated using the ssh key pair and then we will have to enter the UoR password.<\/p>\n<pre class=\"lang:default decode:true\">pawel@homepc:~$ ssh qx901702@act-ssh.reading.ac.uk -p2222\r\n******************************************************************************\r\n* NOTICE TO USERS                                                            *\r\n*                                                                            *\r\n* Use of this system is restricted to registered members of The University   *\r\n* of Reading.  Unauthorised access is a criminal offence under United        *\r\n* Kingdom law.                                                               *\r\n*                                                                            *\r\n* All data stored on this system belongs to The University of Reading and    *\r\n* may be monitored by authorised personnel.  The data on the system may be   *\r\n* searched at the request of law enforcement or other persons, and may be    *\r\n* disclosed and used for disciplinary or civil actions and criminal          *\r\n* prosecution as appropriate.                                                *\r\n*                                                                            *\r\n* Use of this computer system constitutes consent to these policies,         *\r\n* unauthorised users disconnect now!                                         *\r\n******************************************************************************\r\n* Authenticate with with ssh key and then with UoR password                  *\r\n* If you get 'Permission denied' possibly you have not setup your ssh keys   *\r\n******************************************************************************\r\nqx901702@act-ssh.reading.ac.uk's password: \r\nLast login: Mon Mar 30 15:37:42 2020 from cpc95916-rdng25-2-0-cust250.15-3.cable.virginm.net\r\n[qx901702@act-ssh ~]$<\/pre>\n<p>From act-ssh we can connect further e.g. to RACC:<\/p>\n<pre class=\"lang:default decode:true\">[qx901702@act-ssh ~]$ ssh cluster.act.rdg.ac.uk -Y\r\nLast login: Mon Mar 30 14:27:43 2020 from act-ssh.reading.ac.uk\r\n\r\n\tWelcome to the Reading Academic Computing Cluster (RACC)\r\n\r\nracc-login.act.rdg.ac.uk is opening a session on one of the login nodes\r\nThe login nodes can be used for considerate interactive computing and batch job submissions.\r\nSee https:\/\/research.reading.ac.uk\/act\/knowledgebase\/academic-cluster-usage\r\n\r\nWarning: Permanently added '[racc-login-0-4.local]:33000' (ECDSA) to the list of known hosts.\r\nLast login: Sun Mar 29 18:17:27 2020 from racc-login.local\r\nRocks 7.0 (Manzanita)\r\nProfile built 13:40 25-May-2019\r\n\r\nKickstarted 14:09 25-May-2019\r\n[qx901702@racc-login-0-4 ~]$ \r\n<\/pre>\n<p>This can also be done in one line, using the ssh jump host option &#8216;-J&#8217;.<\/p>\n<pre class=\"lang:default decode:true\">pawel@homepc:~$ ssh -J qx901702@act-ssh.reading.ac.uk:2222 qx901702@cluster.act.rdg.ac.uk -Y\r\n******************************************************************************\r\n* NOTICE TO USERS                                                            *\r\n*                                                                            *\r\n* Use of this system is restricted to registered members of The University   *\r\n* of Reading.  Unauthorised access is a criminal offence under United        *\r\n* Kingdom law.                                                               *\r\n*                                                                            *\r\n* All data stored on this system belongs to The University of Reading and    *\r\n* may be monitored by authorised personnel.  The data on the system may be   *\r\n* searched at the request of law enforcement or other persons, and may be    *\r\n* disclosed and used for disciplinary or civil actions and criminal          *\r\n* prosecution as appropriate.                                                *\r\n*                                                                            *\r\n* Use of this computer system constitutes consent to these policies,         *\r\n* unauthorised users disconnect now!                                         *\r\n******************************************************************************\r\n* Authenticate with with ssh key and then with UoR password                  *\r\n* If you get 'Permission denied' possibly you have not setup your ssh keys   *\r\n******************************************************************************\r\nqx901702@act-ssh.reading.ac.uk's password: \r\nWarning: No xauth data; using fake authentication data for X11 forwarding.\r\nLast login: Mon Mar 30 15:43:15 2020 from act-ssh.reading.ac.uk\r\n\r\n\tWelcome to the Reading Academic Computing Cluster (RACC)\r\n\r\nracc-login.act.rdg.ac.uk is opening a session on one of the login nodes\r\nThe login nodes can be used for considerate interactive computing and batch job submissions.\r\nSee https:\/\/research.reading.ac.uk\/act\/knowledgebase\/academic-cluster-usage\r\n\r\nWarning: Permanently added '[racc-login-0-4.local]:40518' (ECDSA) to the list of known hosts.\r\nLast login: Mon Mar 30 15:43:16 2020 from racc-login.local\r\nRocks 7.0 (Manzanita)\r\nProfile built 13:40 25-May-2019\r\n\r\nKickstarted 14:09 25-May-2019\r\n[qx901702@racc-login-0-4 ~]$<\/pre>\n<h5>Personal ssh configuration file &#8211; advanced and optional topics start here<\/h5>\n<p>Users can have their personal ssh client configuration file in ~\/.ssh\/config. We will use this file to <strong>automate many aspects of ssh connections via act-ssh<\/strong> to achieve similar effects to those the Windows users enjoy if they follow the <a href=\"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/act-ssh-with-mobaxterm-step-by-step-guide\/\">MobaXterm instructions<\/a>. We can select different configuration options for specific hosts or groups of hosts. The following example contains configuration that might be useful for users connecting from home and working on UoR Linux systems.<\/p>\n<pre class=\"lang:default decode:true \" title=\"~\/.ssh\/config\">Host *\r\n        ServerAliveInterval 30\r\n        ServerAliveCountMax 3\r\n        # you might need to create the directory ~\/.ssh\/controlmasters\/\r\n        ControlPath ~\/.ssh\/controlmasters\/%l_%r@%h:%p\r\n        ControlMaster auto\r\n        ControlPersist yes\r\n        ForwardX11 yes\r\n        ForwardAgent yes\r\nHost act-ssh\r\n        HostName act-ssh.reading.ac.uk\r\n        User &lt;UoR_username&gt;\r\n        Port 2222\r\n        # SOCKS proxy tunnel for NX and web browsing\r\n        DynamicForward 4444\r\n        # example: remote desktop to Windows machine on campus (commented out)\r\n        # Localforward &lt;33389&gt; &lt;uor-campus-pc.rdg.ac.uk&gt;:3389\r\n        # example: tunnel for NX (redundant example, we use SOCKS instead, commented out\r\n        # Localforward &lt;4040&gt; nx.reading.ac.uk:4000HostName act-ssh.reading.ac.uk\r\nHost *.rdg.ac.uk *.reading.ac.uk\r\n      User &lt;UoR username&gt;\r\n      ProxyJump act-ssh\r\n<\/pre>\n<p>The first group\u00a0 &#8216;*&#8217; contains configuration that will be applied to all hosts.\u00a0 The options &#8216;ServerAliveInterval&#8217; and &#8216;ServerAliveInterval&#8217; will prevent closing temporarily inactive connections. The three options &#8216;ControlPath&#8217;, &#8216;ControlMaster&#8217;, and &#8216;ControlPersist&#8217; are here to create and maintain a master connection (ssh multiplexing). This allows to speed up subsequent connections to the same host. Because all subsequent connections will share the same master connection, there will be no need to enter the password again and starting a connection will be very fast as no connection initialization and authentication will be needed. For these options to work you might need to create the directory ~\/.ssh\/controlmasters\/ on your own. Finally, we typically will want to enable X11 forwarding, to be able to run GUI applications on the server and display the application window on the local machine, so we globally set \u00a0 &#8216;ForwardX11&#8217; to &#8216;yes&#8217;.<\/p>\n<p>The second part of the file contains options for the connection to act-ssh.\u00a0 The first line &#8216;Host act-ssh&#8217; sets an alias, the name used here could be anything, but using the proper hostname makes sense. The full host name with domain component is defined in the next line. From now on we will use the short name act-ssh and ssh will know that we want to connect to act-ssh.reading.ac.uk using the configuration options set up here. In case you have a different user name on your home machine, it is convenient to specify the UoR user name.\u00a0 In this case we use a nonstandard port, so it is helpful to set &#8216;Port 2222&#8217;, so that we will not have to remember about it each time when making the connection. If we just stop right here, we already have a very convenient set up. From now on, we can connect to act-ssh just by typing &#8216;ssh act-ssh&#8217;, not &#8216;ssh -p2222 -Y -o ServerAliveInterval=30 -o ServerAliveCountMax=3 qx901702@act-ssh.reading.ac.uk&#8217;, and we will need to authenticate to act-ssh only when making the connection for the first time.<\/p>\n<pre class=\"lang:default decode:true\">pawel@homepc:~$ ssh act-ssh\r\n******************************************************************************\r\n* NOTICE TO USERS                                                            *\r\n*                                                                            *\r\n* Use of this system is restricted to registered members of The University   *\r\n* of Reading.  Unauthorised access is a criminal offence under United        *\r\n* Kingdom law.                                                               *\r\n*                                                                            *\r\n* All data stored on this system belongs to The University of Reading and    *\r\n* may be monitored by authorised personnel.  The data on the system may be   *\r\n* searched at the request of law enforcement or other persons, and may be    *\r\n* disclosed and used for disciplinary or civil actions and criminal          *\r\n* prosecution as appropriate.                                                *\r\n*                                                                            *\r\n* Use of this computer system constitutes consent to these policies,         *\r\n* unauthorised users disconnect now!                                         *\r\n******************************************************************************\r\n* Authenticate with with ssh key and then with UoR password                  *\r\n* If you get 'Permission denied' possibly you have not setup your ssh keys   *\r\n******************************************************************************\r\nqx901702@act-ssh.reading.ac.uk's password: \r\nLast login: Mon Mar 30 16:27:21 2020 from cpc95916-rdng25-2-0-cust250.15-3.cable.virginm.net\r\n[qx901702@act-ssh ~]$ exit\r\nlogout\r\nShared connection to act-ssh.reading.ac.uk closed.\r\npawel@homepc:~$ ssh act-ssh\r\nLast login: Mon Mar 30 16:29:07 2020 from cpc95916-rdng25-2-0-cust250.15-3.cable.virginm.net\r\n[qx901702@act-ssh ~]$ \r\n<\/pre>\n<p>If something doesn&#8217;t work, or when we are just curious what is happening behind the scenes, we can add the option &#8216;-v&#8217; for increased verbosity to the ssh command.<\/p>\n<p>Let&#8217;s skip the tunneling options for now, and move on to &#8216;Host cluster&#8217;. Here, we define the connection to cluster.act.rdg.ac.uk. The line &#8216;ProxyJump act-ssh:2222&#8217; will automate connecting via act-ssh as a jump host, so adding -J explicitly will not be needed anymore.<\/p>\n<pre class=\"lang:default decode:true \">pawel@homepc:~$ ssh cluster\r\nLast login: Mon Mar 30 17:06:46 2020 from act-ssh.reading.ac.uk\r\n\r\n\tWelcome to the Reading Academic Computing Cluster (RACC)\r\n\r\nracc-login.act.rdg.ac.uk is opening a session on one of the login nodes\r\nThe login nodes can be used for considerate interactive computing and batch job submissions.\r\nSee https:\/\/research.reading.ac.uk\/act\/knowledgebase\/academic-cluster-usage\r\n\r\nWarning: Permanently added '[racc-login-0-4.local]:34232' (ECDSA) to the list of known hosts.\r\nLast login: Mon Mar 30 17:06:47 2020 from racc-login.local\r\nRocks 7.0 (Manzanita)\r\nProfile built 13:40 25-May-2019\r\n\r\nKickstarted 14:09 25-May-2019\r\n[qx901702@racc-login-0-4 ~]$<\/pre>\n<p>In a similar fashion you can add entries for other hosts, also for remote site like JASMIN.<\/p>\n<p>Now let&#8217;s discuss the ssh tunnels created in the configuration file, in the act-ssh part. The line &#8221;DynamicForward localhost:4444&#8243; is quite simple and quite powerful. It sets a SOCKS proxy on act-ssh and tunnels it to port 4444 on localhost. Now we can point any SOCKS aware application to use it and connect to campus services via act-ssh. Two examples are the NoMachine Enterprise Client for Linux and Firefox.<\/p>\n<p>In case of NoMachine, you just point it to nx.reading.ac.uk as usual, then click &#8216;Advanced&#8217;, tick &#8216;Use proxy connection&#8217; and click the corresponding Setting button. There you just tick &#8216;Manual proxy configuration&#8217;, select SOCKS proxy, and point it to localhost port 4444.<\/p>\n<p>In Firefox, we go to Preferences-&gt;Network Settings and similar to NX, we set it to &#8216;Manual proxy configuration&#8217;, SOCKS v5, and localhost port 4444. Here it is important to <strong>tick &#8216;Proxy DNS when using SOCKS v5&#8217;,<\/strong> so we can use UoR DNS and resolve internal UoR IP addresses (many ACT IP addresses are like that). We might also be interested to use &#8216;No Proxy for&#8217;, and e.g. add *.com (or better not this one as this will include Microsoft sites, e.g. web Outlook, and they will require MFA if connecting from off-campus) and *.co.uk, such that connections to sites like youtube.com,\u00a0 www.netflix.com, or bbc.co.uk will not be unnecessarily routed via the proxy, i.e. via the UoR network. In general, <strong>one needs to be careful with this to not route their web browsing traffic via act-ssh when not needed<\/strong>.<\/p>\n<p>The following lines define local port forwarding tunnels, for RDP connections to a Windows desktop and for NX (see <a href=\"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/554\/\">Connecting to NX from Outside the University Campus<\/a>). Most likely we will not need them, as connecting to Windows desktop is not the recommended way of remote working and NX is already configured using SOCKS proxy, but we might use those as examples and create other tunnels as needed.<\/p>\n<h5>Storage access<\/h5>\n<p>Obviously, we can use act-ssh or (without even setting up two factor authentication for act-ssh) mft.act.reading.ac.uk with any GUI or command line sftp client software. If we want to make it more persistent and transparent, a good option is mounting it with sshfs. Here we are on our personal machine, so we will set it up in the same locations as on UoR systems (but mounting it that way, i.e. for one user, in a shared locations on a shared machine would not be elegant).<\/p>\n<pre class=\"lang:default decode:true \">pawel@homepc:~$ sudo mkdir \/storage\/\r\npawel@homepc:~$ sudo mkdir -p \/home\/users\/qx901702\r\npawel@homepc:~$ sshfs act-ssh:\/home\/users\/qx901702 \/home\/users\/qx901702\r\npawel@homepc:~$ sshfs act-ssh:\/storage \/storage<\/pre>\n<p>Alternatively, the directories can be created in user&#8217;s home directory and sudo access is not needed.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this article we show a possible approach how to set up a home Unix machine to connect to campus services via act-ssh. It is similar to act-ssh with MobaXterm \u2013 step by step guide\u00a0(it might be usefull to read the MobaXterm article for some extra background explanations). However, beyond setting up the ssh keys,<\/p>\n","protected":false},"author":361,"featured_media":5701,"template":"","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"__cvm_playback_settings":[],"__cvm_video_id":"","_links_to":"","_links_to_target":""},"kbe_taxonomy":[],"kbe_tags":[],"class_list":["post-5479","kbe_knowledgebase","type-kbe_knowledgebase","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.8.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>act-ssh for Linux and Mac users - step by step guide - Academic Computing Team<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/act-ssh-for-linux-and-mac-users-step-by-step-guide\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"act-ssh for Linux and Mac users - step by step guide - Academic Computing Team\" \/>\n<meta property=\"og:description\" content=\"In this article we show a possible approach how to set up a home Unix machine to connect to campus services via act-ssh. It is similar to act-ssh with MobaXterm \u2013 step by step guide\u00a0(it might be usefull to read the MobaXterm article for some extra background explanations). However, beyond setting up the ssh keys,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/act-ssh-for-linux-and-mac-users-step-by-step-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"Academic Computing Team\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-22T17:14:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/research.reading.ac.uk\/act\/wp-content\/uploads\/sites\/2\/Unorganized\/ssh.png\" \/>\n\t<meta property=\"og:image:width\" content=\"256\" \/>\n\t<meta property=\"og:image:height\" content=\"256\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/act-ssh-for-linux-and-mac-users-step-by-step-guide\/\",\"url\":\"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/act-ssh-for-linux-and-mac-users-step-by-step-guide\/\",\"name\":\"act-ssh for Linux and Mac users - step by step guide - Academic Computing Team\",\"isPartOf\":{\"@id\":\"https:\/\/research.reading.ac.uk\/act\/#website\"},\"datePublished\":\"2020-03-30T13:25:57+00:00\",\"dateModified\":\"2020-11-22T17:14:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/act-ssh-for-linux-and-mac-users-step-by-step-guide\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/act-ssh-for-linux-and-mac-users-step-by-step-guide\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/act-ssh-for-linux-and-mac-users-step-by-step-guide\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/research.reading.ac.uk\/act\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Knowledgebase\",\"item\":\"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"act-ssh for Linux and Mac users &#8211; step by step guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/research.reading.ac.uk\/act\/#website\",\"url\":\"https:\/\/research.reading.ac.uk\/act\/\",\"name\":\"Academic Computing Team\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/research.reading.ac.uk\/act\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/research.reading.ac.uk\/act\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/research.reading.ac.uk\/act\/#organization\",\"name\":\"University of Reading\",\"url\":\"https:\/\/research.reading.ac.uk\/act\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/research.reading.ac.uk\/act\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/research.reading.ac.uk\/act\/wp-content\/uploads\/sites\/2\/2017\/08\/cropped-University_of_Reading_shield-1.png\",\"contentUrl\":\"https:\/\/research.reading.ac.uk\/act\/wp-content\/uploads\/sites\/2\/2017\/08\/cropped-University_of_Reading_shield-1.png\",\"width\":512,\"height\":512,\"caption\":\"University of Reading\"},\"image\":{\"@id\":\"https:\/\/research.reading.ac.uk\/act\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"act-ssh for Linux and Mac users - step by step guide - Academic Computing Team","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/act-ssh-for-linux-and-mac-users-step-by-step-guide\/","og_locale":"en_GB","og_type":"article","og_title":"act-ssh for Linux and Mac users - step by step guide - Academic Computing Team","og_description":"In this article we show a possible approach how to set up a home Unix machine to connect to campus services via act-ssh. It is similar to act-ssh with MobaXterm \u2013 step by step guide\u00a0(it might be usefull to read the MobaXterm article for some extra background explanations). However, beyond setting up the ssh keys,","og_url":"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/act-ssh-for-linux-and-mac-users-step-by-step-guide\/","og_site_name":"Academic Computing Team","article_modified_time":"2020-11-22T17:14:44+00:00","og_image":[{"width":256,"height":256,"url":"https:\/\/research.reading.ac.uk\/act\/wp-content\/uploads\/sites\/2\/Unorganized\/ssh.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/act-ssh-for-linux-and-mac-users-step-by-step-guide\/","url":"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/act-ssh-for-linux-and-mac-users-step-by-step-guide\/","name":"act-ssh for Linux and Mac users - step by step guide - Academic Computing Team","isPartOf":{"@id":"https:\/\/research.reading.ac.uk\/act\/#website"},"datePublished":"2020-03-30T13:25:57+00:00","dateModified":"2020-11-22T17:14:44+00:00","breadcrumb":{"@id":"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/act-ssh-for-linux-and-mac-users-step-by-step-guide\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/research.reading.ac.uk\/act\/knowledgebase\/act-ssh-for-linux-and-mac-users-step-by-step-guide\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/act-ssh-for-linux-and-mac-users-step-by-step-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/research.reading.ac.uk\/act\/"},{"@type":"ListItem","position":2,"name":"Knowledgebase","item":"https:\/\/research.reading.ac.uk\/act\/knowledgebase\/"},{"@type":"ListItem","position":3,"name":"act-ssh for Linux and Mac users &#8211; step by step guide"}]},{"@type":"WebSite","@id":"https:\/\/research.reading.ac.uk\/act\/#website","url":"https:\/\/research.reading.ac.uk\/act\/","name":"Academic Computing Team","description":"","publisher":{"@id":"https:\/\/research.reading.ac.uk\/act\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/research.reading.ac.uk\/act\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/research.reading.ac.uk\/act\/#organization","name":"University of Reading","url":"https:\/\/research.reading.ac.uk\/act\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/research.reading.ac.uk\/act\/#\/schema\/logo\/image\/","url":"https:\/\/research.reading.ac.uk\/act\/wp-content\/uploads\/sites\/2\/2017\/08\/cropped-University_of_Reading_shield-1.png","contentUrl":"https:\/\/research.reading.ac.uk\/act\/wp-content\/uploads\/sites\/2\/2017\/08\/cropped-University_of_Reading_shield-1.png","width":512,"height":512,"caption":"University of Reading"},"image":{"@id":"https:\/\/research.reading.ac.uk\/act\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/research.reading.ac.uk\/act\/wp-json\/wp\/v2\/kbe_knowledgebase\/5479","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/research.reading.ac.uk\/act\/wp-json\/wp\/v2\/kbe_knowledgebase"}],"about":[{"href":"https:\/\/research.reading.ac.uk\/act\/wp-json\/wp\/v2\/types\/kbe_knowledgebase"}],"author":[{"embeddable":true,"href":"https:\/\/research.reading.ac.uk\/act\/wp-json\/wp\/v2\/users\/361"}],"version-history":[{"count":6,"href":"https:\/\/research.reading.ac.uk\/act\/wp-json\/wp\/v2\/kbe_knowledgebase\/5479\/revisions"}],"predecessor-version":[{"id":5859,"href":"https:\/\/research.reading.ac.uk\/act\/wp-json\/wp\/v2\/kbe_knowledgebase\/5479\/revisions\/5859"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/research.reading.ac.uk\/act\/wp-json\/wp\/v2\/media\/5701"}],"wp:attachment":[{"href":"https:\/\/research.reading.ac.uk\/act\/wp-json\/wp\/v2\/media?parent=5479"}],"wp:term":[{"taxonomy":"kbe_taxonomy","embeddable":true,"href":"https:\/\/research.reading.ac.uk\/act\/wp-json\/wp\/v2\/kbe_taxonomy?post=5479"},{"taxonomy":"kbe_tags","embeddable":true,"href":"https:\/\/research.reading.ac.uk\/act\/wp-json\/wp\/v2\/kbe_tags?post=5479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}