Chapter 2. Configuring secure communication with the ssh system roles