One effective way of securing SSH access to your cloud server is to use a public-private key pair. This means that a public key is placed on the server and a private key is placed on your local workstation. Using a key pair makes it impossible for someone to log in by using just a password, as long as you set up SSH to deny password-based authentication.

Generate keys

In Windows, use PuTTYgen to generate your public and private keys. Download PuTTYgen from the PuTTY download page. (PuTTYgen might have been installed previously with PuTTY or WinSCP.)

  1. Launch the program, and then click the Generate button. The program generates the keys for you.
  2. Enter a unique key passphrase in the Key passphrase and Confirm passphrase fields, or leave it empty in order not to use the passphrase.
  3. Save the public and private keys by clicking the Save public key and Save private key buttons. From the Public key for pasting into OpenSSH authorized_keys file field at the top of the window, copy all the text (starting with ssh-rsa) to your clipboard by pressing Ctrl-C. You need this key available on your clipboard to paste either in the Client Area or directly into the authorized keys on your Kronos Cloud Server.

Use the key pair

You can use the RSA key pair in the following ways.

Add a new public key to the list

In the Terminal, go to your server's dashboard and then to the Security tab, there you will find your SSH Keys. Click Add Key. Enter the key label and then paste the entire public key into the Public key field. If you mark it as default, the current and all future machines will be assigned this key. Then click Yes. Go back to the Security tab and confirm that your key is listed in the SSH Key list.

Did this answer your question?