On such systems like cloud instances you don’t want extra software under any circumstances.
It is the same for Linux appliances of any kind.
@paolo please take a look at section 6 of the linked documentation → Encrypted: Use of an SSH tunnel
On such systems like cloud instances you don’t want extra software under any circumstances.
It is the same for Linux appliances of any kind.
@paolo please take a look at section 6 of the linked documentation → Encrypted: Use of an SSH tunnel