Skip to main content
Skip table of contents

Using Public Key Authentication

Public key authentication for SSH is more secure than using passwords. It relies on cryptographic key pairs instead of credentials transmitted over the network, significantly reducing the risk of brute-force or credential theft attacks.

  1. (Optional) If you do not already have an SSH key pair, create one on your remote host using the ssh-keygen command.
    --> For details on available options, see: ssh-keygen manual page

  2. Make a copy of your public SSH key in another directory and name the file authorized_keys.

  3. Create a new File Object in the UMS:

    1. Upload the authorized_keys file.

    2. Set Classification to Undefined.

    3. Set Device file location to /userhome/.ssh/

    4. Set Owner to User.

    5. Set Owner access rights to rwx.

    6. Set Other access rights to (None).

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.