SSH allows secure file transfer and remote logins over the
internet. Your connection via SSH is encrypted allowing the secure
connection. In this section you can manage your SSH keys to allow
automation when logging in via SSH. Using public key authentication is
an alternative to password authentication. Since the private key must be
held to authenticate, it is virtually impossible to brute force. You
can import existing keys, generate new keys, as well as
manage/delete keys.
SSH (Secure Shell) is a program to log into another
computer/server over a network securely. It provides strong
authentication and secure communications over insecure channels. Your
login, commands, text are all encrypted when using ssh.
- Log into cPanel
- Go to Security area
- Click on Manage SSH Keys
- Click on Generate a new Key
- Click on Generate
The public and private key are similar to a puzzle. They are
created together to use during the login/authentication process. The
public key resides on the server (the remote location). The private key
resides locally on your computer/server. When you attempt to login to a
server, the public and private key are compared. If they match, then you
will be allowed to login to the server location.
** You can download the private/public keys here and import into
PuTTY
(or other SSH clients) if you prefer using something else for SSH
connections. Or, if you have been using PuTTY, you can import the
public/private keys by clicking on Import Key. You can also download
your key in PuTTY’s ppk format under View/Download.