SSH and SSH Keys

SSH (Secure Shell) is a network protocol that allows secure remote access over an encrypted connection. Through an SSH connection you can easily manage your files and folders, modify their permissions, edit files directly on the server, etc.

SSH provides several types of authentication, including password and key-based authentication. Key-based authentication is a very secure authentication method and it is recommended over password-based authentication which can be brute-forced.


Key-based authentication utilizes cryptographic keys to establish a trust relationship between server and client. Key-based authentication can require a passphrase (password) or can function without a passphrase on the key.


To use this type of authentication, you have to generate an SSH key pair. The key pair consists of a public and a private key. The public key is kept on the server, while the private key is kept on your computer. When you connect via SSH, a trust relationship between your computer and the server is established using the key pair. If any of the keys is missing or there is a discrepancy between the keys, a connection cannot be established.


Was this article helpful?

mood_bad Dislike 0
mood Like 0
visibility Views: 2568