Navigate to the PuTTY Key Generator interface. Under the Actions heading, click Generate. PuTTY generates the key and displays the result under the Key menu. Copy the public key and paste it in the.ssh/authorizedkeys file. Enter a passphrase in the Key passphrase and Confirm passphrase text boxes. Click Save private key and save the key as a.

Valid for versions 82 through the latest version
Last modified: October 7, 2019
This interface provides information about how to connect to another web server via the SSH (secure shell) network protocol.
The SSH network protocol allows you to connect to another web server over the Internet via a command line interface (CLI). You can use this network protocol to remotely manage your server, configure CGI scripts, and perform other tasks.
Many modern operating systems, such as MacOS® and Linux® distributions, include SSH. If you use Microsoft Windows® to connect to your server, you must use an SSH client, such as PuTTY, to log in to your server.
Many Unix-based operating systems include standardized commands. For a list of standardized Unix-based (POSIX) commands, read the GNU Coreutils documentation.
To use PuTTY to connect to your server via SSH, perform the following steps:
Download and install the PuTTY client.
From the Windows Start menu, open the client.
In the Session interface, enter the hostname or IP address of the server in the Host Name (or IP address) text box.
Enter the port number in the Port text box.
Select the SSH protocol.
Click Open.
Enter your cPanel account’s username.
Enter your cPanel account’s password.
To log in to a server via SSH with PuTTY and a public key, perform the following steps:
From the Windows Start menu, open the client.
Navigate to the PuTTY Key Generator interface.
Under the Actions heading, click Generate. PuTTY will generate the key and display the result under the Key menu.
Copy the public key and paste it in the .ssh/authorized_keys file.
Enter a passphrase in the Key passphrase and Confirm passphrase text boxes.
Click Save private key and save the key as a .ppk file.
In the Session interface, from the Saved Sessions menu, select your preferred authorization session and click Load.
Navigate to the Auth interface under the SSH category.
Click Browse, select the private key file to upload, and click Open.
Navigate to cPanel’s Manage SSH Keys interface (Home >> Security >> SSH Access >> Manage SSH Keys) and import the server’s keys.
To log in to your MacOS or Linux server via SSH, perform the following steps: Generate a random unique key react.
Open a terminal session.
Run the following command: ssh -p port user@IP where port represents the port number, user represents your username, and IP represents your IP address.
This section of cPanel’s SSH Access interface allows you to create, import, manage, and remove SSH keys. The system will use these keys when you confirm that a specific computer has the right to access your website’s information with SSH.
Use this section of the interface to create new SSH key pairs, which include a public key and a private key.
To generate a new SSH key pair, perform the following steps:

Click Manage SSH Keys.
Click Generate a New Key.
To use a custom key name, enter the key name in the _Key Name (This value defaults to idrsa): text box.
Enter and confirm the new password in the appropriate text boxes.
0 in WHM's Password Strength Configuration interface (WHM >> Home >> Security Center >> Password Strength Configuration).0 indicates a weak password, while 100 indicates a very secure password.Select the desired key type.
DSA keys provide quicker key generation and signing times.
RSA keys provide quicker verification times.
Select the desired key size.
Click Generate Key. The interface will display the saved location of the key.
To import an existing SSH key, perform the following steps:
Click Manage SSH Keys.
Click Import Key.
To use a custom key name, enter the key name in the _Choose a name for this key (defaults to iddsa) text box.
Paste the public and private keys into the appropriate text boxes.
Click Import.
The Public Keys and Private Keys tables display the following information about your existing keys:
Name — The key’s name. Public and private keys use the same key name.
Authorization Status — Whether you authorized the key.
Actions — You can perform the following actions:
Delete Key — Click to delete the key, and then click Yes to confirm that you wish to delete the key.
View/Download — Click to view or download the key. To download the key, save the contents of the Public SSH Key text box to your computer.
Manage — Click to manage authorization for the key. A new interface will appear. Click Authorize to authorize the key, or Deauthorize Bit coin private key generator. to revoke authorization for the key.
You can only perform this action for public keys.
After you deauthorize a key, that key’s users cannot log in with the associated private key.