Chapter 25. Configuring secure communication by using the ssh and sshd RHEL system roles