When you enable remote login, you can access your Mac using Secure Shell (SSH) from another computer.
If you don’t know what this is then you most likely do not want to enable it as it will make your Mac less secure, however if you need to use SSH to access your Mac read on!
Go to:
System Preferences > Sharing

Check the Remote Login Service. This will also enable secure FTP (sftp).

You now need to set which users can log in:
From the Allow access for list:

All users: Will allow any of your Mac’s users to log in, this includes any Network Users / Network Groups that are set in the Users & Groups preference pane.
To restrict the users that can access this Mac set the radio option to Only these users:

If you want to be more specific than just restricting access to Administrators (to see which users are set to Administrator open the Users & Groups preference pane):
Click the plus button + to add users, then choose who can log in using SSH.

Users & Groups is a list of all the users on your Mac. Network Users / Network Groups include people on your network. Select the user you want to add and then click Select.

You can remove Users from the Access list by selecting their name and pressing the - button:

To Log in from another computer using SSH open the Terminal which is in Applications/Utilities on a Mac, then type: ssh username@IP address
For example, if your user name is pete, and your computer’s IP address is 192.168.2.3, open the Terminal on another Mac and type: ssh pete@192.168.2.3.

If you don’t know the user name and IP address for the Mac you want to access via SSH then open the Remote Login pane of Sharing preferences and your user name and IP address are shown below “Remote Login: On”.

The IP address 192.168.2.3 is a local subnet IP address and won’t allow you to access your Mac from outside the local network (both computers will need to be on the same network).
In order to use Remote Login to SSH into your Mac from the outside world you will have to set up port forwarding on your router and make note of the public IP address of your router, if you do not have a static IP address with your Internet Service Provider you can use a dynamic DNS service which is supported by most routers. Wikihow has a generic guide to setting up Port Forwarding on your router here.
You will want to set up and enable port forwarding for port 22 to the IP address of the Mac you have turned Remote Login on. Doing this is opening up your Mac to the world and presents a huge security risk if you do not know what you are doing.
Related Posts
10 Things You Didn't Know You Could Do With Apple Configurator (That Save Mac Admins Hours)
1) Retro-enroll Devices into Apple Business Manager (iOS/iPadOS) If a Mac wasn’t purchased through your ABM-linked reseller, you can still claim it. Adding it via Configurator means you get Automated Device Enrollment...
The Evolution of Apple Certification: A Journey Through Versions, Challenges & Growth
A Look Back: The macOS 10.5 Era and the Early Certification Landscape Back in 2008 when I first became an Apple Certified Support Professional, the certification process was a different beast entirely....
Secure Software, Secure Career: How I Passed the CSSLP
Where the CISSP is broad, the CSSLP is laser-focused. This exam dives deep into secure software principles, threat modeling, data protection, API security, database hardening, and development methodologies like Agile, DevOps, and...
Managing Bring Your Own Device (BYOD) for Android with Microsoft Intune
BYOD For Android using Microsoft Intune Alright, so today we’re going to be talking about the management of bring your own device BYOD for Android devices. There’s a lot of information out...
BYO with me in 2025: iOS with User Enrollment in JAMF Pro
BYOD Is for Mobile Devices only right? It really depends on your companies needs. For example many companies need to hire 1099 contractors and in such a case they come with their...
Securing BYOD Email Access: Exploring Strategies in Microsoft 365
Strengthening Your BYOD Program with Secure Email Policies In today’s mobile-first world, organizations increasingly rely on Bring Your Own Device (BYOD) programs to empower employees while optimizing costs. However, this flexibility introduces...
How I Conquered the CISSP Exam: 9 Months, Top Resources, and Proven Strategies
My Study Plan 1. Set a Realistic Timeline From the outset, I knew this wasn’t a sprint—it was a marathon. I gave myself 9 months to study, breaking the material into manageable...
Get more out of scripting than you may expect
Expect is an extension to the Tcl scripting language written by Don Libes. The program automates interactions with programs that expose a text terminal interface. Expect, originally written in 1990 for the...
Cybersecurity is more than having the right tools
Cybersecurity is the convergence of people, processes and technology that come together to protect organizations.