SSH allows secure file transfer and remote logins over the internet. Your connection via SSH is encrypted allowing the secure connection. In this section you can manage your SSH keys to allow automation when logging in via SSH. Using public key authentication is an alternative to password authentication. Since the private key must be held to authenticate, it is virtually impossible to brute force. You can import existing keys, generate new keys, as well as manage/delete keys.
SSH (Secure Shell) is a program to log into another computer/server over a network securely. It provides strong authentication and secure communications over insecure channels. Your login, commands, text are all encrypted when using ssh.
(cPanel >> Home >> Security >> SSH Access)
This interface provides information about how to connect to another web server via the SSH (secure shell) network protocol. The SSH (secure shell) network protocol allows you to connect to another web server over the Internet via a command line interface (CLI). You can use this network protocol to remotely manage your server, configure CGI scripts, and perform other tasks. Many modern operating systems, such as MacOS® and Linux distributions, include SSH. If you use Microsoft Windows® to connect to your server, you must use an SSH client, such as PuTTY, to log in to your server. Many Unix-based operating systems include standardized commands. For a list of standardized Unix-based (POSIX) commands, read the One-Serve website documentation.
Note:
Whilst we do provide SSH access, you will need to ensure that it is enabled in your package. If you suspect that you don’t have SSH access, but require it, then you can click ‘Open Ticket’ from our client area and let the support team know you would like SSH access enabling.
The following sections describe how to connect to your server via various SSH clients. To in to a server via SSH with PuTTY and a public key, perform the following steps:
.ssh/authorized_keys
file..ppk
file. Important: You must save PuTTY keys as .ppk
files.
This section of cPanel’s SSH Access interface allows you to create, import, manage, and remove SSH keys. The system will use these keys when you confirm that a specific computer has the right to access your website’s information with SSH.
Use this section of the interface to create new SSH key pairs, which include a public key and a private key. To generate a new SSH key pair, perform the following steps:
0
indicates a weak password, while 100
indicates a very secure password.
To import an existing SSH key, perform the following steps:
The Public Keys and Private Keys tables display the following information about your existing keys: