Looking for a secure way to access your server? Public key authentication is your best bet! By disabling password-based logins, you can protect your server from brute-force attacks, keeping your data safe and sound.
Here’s your step-by-step 1-grid guide on how to create and use SSH keys for safer logins. It’s easier than you might think and the perfect way to protect your data.
Learn how to protect and generate SSH Keys for secure logins, the 1-grid way.
We offer both Dedicated and VPS servers with an array of Linux options.
Need to manage your Linux-based server efficiently? With 1-grid, setting up SSH connections is simple.
Our easy-to-follow guides ensure you can connect to your server securely and manage it effortlessly, saving you time and hassle.
What is an SSH Key?
SSH or Secure Shell is a cryptographic key used to communicate with servers or Linux hosts.
Establishing SSH Connectivity
While working with Linux-based servers, you will likely spend most of your time in a terminal session. Terminal sessions are connected to your server through SSH.
Simplifying Server Authentication
Tired of remembering multiple passwords for your servers? With SSH keys, you only need one. We’ll help you simplify server authentication, making your admin tasks smoother and more secure.
System administrators prefer using SSH keys because once they have been created, one key can unlock multiple servers, making authentication easier. It’s like having a master key for all your servers!
How to Create a Key Pair
You can generate a key pair with the steps below:
- Open a terminal or command prompt on your computer. Remember to log in as the user for whom you’re creating the keys.
- Generate a new SSH key pair by running the following command:
- Select Enter and enter a password for your Key Pair.
You have now generated a public and private authentication key. Once successfully exchanged with your server’s public key, you can use the SSH key-based authentication to log in.
How to Exchange an SSH Key:
You’re all set to complete a key exchange. While logged in as the root user, you can set up SSH key-based authentication with a LAN (local area network) host.
The example below uses the LAN IP: 192.168.100.105.
How to Authenticate an SSH Key
Go ahead and authenticate the password for the host’s root user. Once you have done so, you will be notified that the key has been added.
You can now log in with ssh root@192.168.100.105. The screen will prompt you to enter the key password.
Your key has now been generated and exchanged, and your server is secure.
Want to find out more about our high-performance servers? Click here.