When you first create a new server, there are a few configuration steps that you should take early on as part of the basic setup. This will increase the security and usability of your server and will give you a solid foundation for subsequent actions.
To log into your server, you will need to know your server’s public IP address and the password for the “root” user’s account. If you have not already logged into your server, you may want to follow the first tutorial in this series, How to Connect to Your Droplet with SSH, which covers this process in detail.
If you are not already connected to your server, go ahead and log in as the root
user using the following command (substitute the highlighted word with your server’s public IP address):
- ssh root@SERVER_IP_ADDRESS
Complete the login process by accepting the warning about host authenticity, if it appears, then providing your root authentication (password or private key). If it is your first time logging into the server, with a password, you will also be prompted to change the root password.
The root user is the administrative user in a Linux environment that has very broad privileges. Because of the heightened privileges of the root account, you are actually discouraged from using it on a regular basis. This is because part of the power inherent with the root account is the ability to make very destructive changes, even by accident.
The next step is to set up an alternative user account with a reduced scope of influence for day-to-day work. We’ll teach you how to gain increased privileges during the times when you need them.
Once you are logged in as root
, we’re prepared to add the new user account that we will use to log in from now on.
This example creates a new user called “demo”, but you should replace it with a user name that you like:
- adduser demo
Next, assign a password to the new user (again, substitute “demo” with the user that you just created):
- passwd demo
Enter a strong password, and repeat it again to verify it.
Now, we have a new user account with regular account privileges. However, we may sometimes need to do administrative tasks.
To avoid having to log out of our normal user and log back in as the root account, we can set up what is known as “super user” or root privileges for our normal account. This will allow our normal user to run commands with administrative privileges by putting the word sudo
before each command.
To add these privileges to our new user, we need to add the new user to the “wheel” group. By default, on CentOS 7, users who belong to the “wheel” group are allowed to use the sudo
command.
As root
, run this command to add your new user to the wheel group (substitute the highlighted word with your new user):
- gpasswd -a demo wheel
Now your user can run commands with super user privileges! For more information about how this works, check out our sudoers tutorial.
The next step in securing your server is to set up public key authentication for your new user. Setting this up will increase the security of your server by requiring a private SSH key to log in.
If you do not already have an SSH key pair, which consists of a public and private key, you need to generate one. If you already have a key that you want to use, skip to the Copy the Public Key step.
To generate a new key pair, enter the following command at the terminal of your local machine:
- ssh-keygen
Assuming your local user is called “localuser”, you will see output that looks like the following:
ssh-keygen outputGenerating public/private rsa key pair.
Enter file in which to save the key (/Users/localuser/.ssh/id_rsa):
Hit return to accept this file name and path (or enter a new name).
Next, you will be prompted for a passphrase to secure the key with. You may either enter a passphrase or leave the passphrase blank.
Note: If you leave the passphrase blank, you will be able to use the private key for authentication without entering a passphrase. If you enter a passphrase, you will need both the private key and the passphrase to log in. Securing your keys with passphrases is more secure, but both methods have their uses and are more secure than basic password authentication.
This generates a private key, id_rsa
, and a public key, id_rsa.pub
, in the .ssh
directory of the localuser’s home directory. Remember that the private key should not be shared with anyone who should not have access to your servers!
After generating an SSH key pair, you will want to copy your public key to your new server. We will cover two easy ways to do this.
Note: The ssh-copy-id
method will not work on DigitalOcean if an SSH key was selected during Droplet creation. This is because DigitalOcean disables password authentication if an SSH key is present, and the ssh-copy-id
relies on password authentication to copy the key.
If you are using DigitalOcean and selected an SSH key during Droplet creation, use option 2 instead.
If your local machine has the ssh-copy-id
script installed, you can use it to install your public key to any user that you have login credentials for.
Run the ssh-copy-id
script by specifying the user and IP address of the server that you want to install the key on, like this:
- ssh-copy-id demo@SERVER_IP_ADDRESS
After providing your password at the prompt, your public key will be added to the remote user’s .ssh/authorized_keys
file. The corresponding private key can now be used to log into the server.
Assuming you generated an SSH key pair using the previous step, use the following command at the terminal of your local machine to print your public key (id_rsa.pub
):
- cat ~/.ssh/id_rsa.pub
This should print your public SSH key, which should look something like the following:
id_rsa.pub contentsssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBGTO0tsVejssuaYR5R3Y/i73SppJAhme1dH7W2c47d4gOqB4izP0+fRLfvbz/tnXFz4iOP/H6eCV05hqUhF+KYRxt9Y8tVMrpDZR2l75o6+xSbUOMu6xN+uVF0T9XzKcxmzTmnV7Na5up3QM3DoSRYX/EP3utr2+zAqpJIfKPLdA74w7g56oYWI9blpnpzxkEd3edVJOivUkpZ4JoenWManvIaSdMTJXMy3MtlQhva+j9CgguyVbUkdzK9KKEuah+pFZvaugtebsU+bllPTB0nlXGIJk98Ie9ZtxuY3nCKneB+KjKiXrAvXUPCI9mWkYS/1rggpFmu3HbXBnWSUdf localuser@machine.local
Select the public key, and copy it to your clipboard.
To enable the use of SSH key to authenticate as the new remote user, you must add the public key to a special file in the user’s home directory.
On the server, as the root
user, enter the following command to switch to the new user (substitute your own user name):
- su - demo
Now you will be in your new user’s home directory.
Create a new directory called .ssh
and restrict its permissions with the following commands:
- mkdir .ssh
- chmod 700 .ssh
Now open a file in .ssh called authorized_keys
with a text editor. We will use vi to edit the file:
- vi .ssh/authorized_keys
Enter insert mode, by pressing i
, then enter your public key (which should be in your clipboard) by pasting it into the editor. Now hit ESC
to leave insert mode.
Enter :x
then ENTER
to save and exit the file.
Now restrict the permissions of the authorized_keys file with this command:
- chmod 600 .ssh/authorized_keys
Type this command once to return to the root
user:
- exit
Now you may SSH login as your new user, using the private key as authentication.
To read more about how key authentication works, read this tutorial: How To Configure SSH Key-Based Authentication on a Linux Server.
Now that we have our new account, we can secure our server a little bit by modifying its SSH daemon configuration (the program that allows us to log in remotely) to disallow remote SSH access to the root account.
Begin by opening the configuration file with your text editor as root:
- vi /etc/ssh/sshd_config
Here, we have the option to disable root login through SSH. This is generally a more secure setting since we can now access our server through our normal user account and escalate privileges when necessary.
To disable remote root logins, we need to find the line that looks like this:
#PermitRootLogin yes
Hint: To search for this line, type /PermitRoot
then hit ENTER
. This should bring the cursor to the “P” character on that line.
Uncomment the line by deleting the “#” symbol (press Shift-x
).
Now move the cursor to the “yes” by pressing c
.
Now replace “yes” by pressing cw
, then typing in “no”. Hit Escape
when you are done editing. It should look like this:
PermitRootLogin no
Disabling remote root login is highly recommended on every server!
Enter :x
then ENTER
to save and exit the file.
Now that we have made our changes, we need to restart the SSH service so that it will use our new configuration.
Type this to restart SSH:
- systemctl reload sshd
Now, before we log out of the server, we should test our new configuration. We do not want to disconnect until we can confirm that new connections can be established successfully.
Open a new terminal window. In the new window, we need to begin a new connection to our server. This time, instead of using the root account, we want to use the new account that we created.
For the server that we configured above, connect using this command. Substitute your own information where it is appropriate:
- ssh demo@SERVER_IP_ADDRESS
Note: If you are using PuTTY to connect to your servers, be sure to update the session’s port number to match your server’s current configuration.
You will be prompted for the new user’s password that you configured. After that, you will be logged in as your new user.
Remember, if you need to run a command with root privileges, type “sudo” before it like this:
- sudo command_to_run
If all is well, you can exit your sessions by typing:
- exit
At this point, you have a solid foundation for your server. You can install any of the software you need on your server now.
If you are not sure what you want to do with your server, check out the next tutorial in this series for Additional Recommended Steps for New CentOS 7 Servers. It covers things like enabling fail2ban
to reduce the effectiveness of brute force attacks, basic firewall settings, NTP, and swap files. It also provides links to tutorials that show you how to set up common web applications.
If you just want to explore, take a look at the rest of our community to find more tutorials. Some popular ideas are configuring a LAMP stack or a LEMP stack, which will allow you to host websites.
Thanks for learning with the DigitalOcean Community. Check out our offerings for compute, storage, networking, and managed databases.
When creating a new CentOS 7 server, there are some basic tasks that you should take to ensure that your server is secure and configured properly. This tutorial series will go over connecting to your server and general security best practices, and will also provide links to articles that will help you to start running your own web server or application.
This textbox defaults to using Markdown to format your answer.
You can type !ref in this text area to quickly search our full set of tutorials, documentation & marketplace offerings and insert the link!
It makes more sense to copy the ssh-key with the command
ssh-copy-id -i ~/.ssh/id_rsa.pub demo@SERVER_IP_ADDRESS
to the server. As a result, the necessary directories and files are created automatically and using the correct file permissions.Command
ssh-copy-id
is much easier than manually copying the key to the server. May be necessary to add it to the guide?Nice article - helped very much. Have a good day!
thanks very much for the tutorial.
Good afternoon,
During installation, the following error occurs:
/opt/dropbox/dropbox-lnx.x86_64-159.4.5870/dropbox: /lib64/libc.so.6: version `GLIBC_2.18’ not found (required by /opt/dropbox/dropbox-lnx.x86_64-159.4.5870/libdropbox_core.so)
Please if anyone can help me.
Thanks.
The primary reason we do Step 4, is to ensure that the new user (eg. demo) is also using SSH public key authentication method, without resorting to using passwords again.
However, the moment the new user (eg. demo) uses sudo for executing commands, the console prompts for password. Since there was no password created, and since the root login disabled in the subsequent Step 5, how would the new user ever use sudo, without a password?
Since
sudo
is not pre-installed with CentOS 7, you should add the lineyum install sudo
, so thatsudo command_to_run
actually works! ;)Excellent tutorial and thank you for your time in creating this but shouldn’t a recommendation to install firewalld be listed here. I just checked the Additional Recommended Steps for New CentOS 7 Servers and when I went to run the following:
systemctl start firewalld
I received the following:
Failed to start firewalld.service: Unit not found.
Figuring that firewalld was already installed with the Centos image.
But it does not state in either tutorial’s how to install it. Very simple:
yum install firewalld
Plus everyone that rolls out a Centos 7 image / droplet should use the update option in yum to update / upgrade all of your CentOS system software to the latest version with one operation.
To perform a full system update, type this command:
yum update
If asked for a password enter the root password.
You could also add the following lines to a cron job. To create a cron job do the following:
crontab -e
Type the a key on your keyboard.
Paste the following lines
#Automatic updates via yum 0 1 * * * /usr/bin/yum -y update >> /dev/null 2>&1 30 23 * * * /usr/bin/yum clean all >> /dev/null 2>&1
Press the ESC key then :wq! then ENTER to save and exit the file.
This will keep your system updated on a regular and automatic basis.
Regards, Robert
If anyone has the same issue I had a very hard time with this:
SSH and Permission denied (publickey,gssapi-keyex,gssapi-with-mic)
Solved it by amending the /etc/ssh/sshd_config --> ‘PasswordAuthentication yes’ --> then re-started the service ‘sudo systemctl restart sshd’
Hope this helps.
I am setting up the server for the first time. Trying to login as root first and Putty gives this error: Disconnected: No supported authentication methods available. Server sent: publickey,gssapi-with-mic,password
CentOS 7.3.
Any chance the system can be improved/fixed?