Creating and Managing SSH (Secure Shell) Credentials
    • 15 Aug 2024
    • 3 Minutes to read
    • Contributors
    • PDF

    Creating and Managing SSH (Secure Shell) Credentials

    • PDF

    Article summary

    SSH keys provide a secure method to connect to remote computers, enabling password-less logins for streamlined access. They function as a digital lock-and-key system, ensuring that only authorized users can access specific computers or servers.

    How Are SSH Keys Generated?

    1. Key Pair Creation: Key Pair Creation: When generating SSH keys, you create a pair consisting of one public and one private key. The public key acts like a lock you can share, while the private key is the only key that fits that lock. These keys are mathematically linked, ensuring that only the paired private key can unlock what the public key locks, thereby enhancing security.

    2. Using Tools for Generation: SSH keys can be generated directly within ACE, or using tools on your computer, such as ssh-keygen on Unix systems or PuTTYgen in WinSCP. These tools use complex algorithms to create a unique and secure key pair. Once generated, keep the private key safe on your computer and share the public key with any server you need to access.

    How Are SSH Keys Used?

    1. Authentication Process: When you try to connect to a server, the server checks if your private key matches the public key you’ve previously given it. If they match, the server knows it’s really you trying to log in and grants you access. This process is called "public-key authentication."

    2. Enhanced Security: SSH keys are much more secure than passwords. Even if someone were to intercept your connection, they wouldn’t be able to figure out your private key. The private key never leaves your computer, and it’s almost impossible to guess due to the complexity of the key.

    Why Are SSH Keys Important?

    SSH keys are crucial for securely connecting to remote systems, especially for developers, system administrators, and anyone working with servers. They provide a strong layer of security by ensuring that only authorized users can access sensitive systems. Because the private key never leaves your device and is extremely difficult to crack, SSH keys are far safer than traditional password-based logins.

    Where do I Add SSH Keys in ACE?

    1. Navigate to Setup → Security Credentials, New.

    2. Complete the following fields:

      1. Identifier: Enter a unique name for this key.

      2. Type: SSH

      3. Username: Enter the username to be associated with this key.

      4. Note: Usernames are unique system-wide. If a username is taken, you will be notified.

      5. Enter the Public and Private Key into the fields.

    3. Save

    Managing SSH Key Pairs in ACE

    ACE allows you to either create a public/private key pair within ACE or with a tool. Once saved, the private key will be hidden from view, ensuring security.

    These SSH keys can then be used in document transfer tasks:

    1. Document Transfer to: The private key encrypts outgoing data, requiring the recipient to have the corresponding public key.

    2. Document Transfer from: Use a credential containing the public key provided by the sender to decrypt incoming data.

    Generating ACE SSH Key Pair

    1. Navigate to: Setup → Security Credentials, New.

    2. Complete the following fields:

      1. Identifier: Typically the username.

      2. Type: Select SSH

      3. Username: Enter the username to be associated with this key.

        1. Username must not contain spaces.

        2. Note: Usernames are unique system-wide. If a username is unavailable, you will be notified.

    3. Generate Key Pair:

      1. Click on Generate to have ACE create the SSH key pair for you

      2. Download the private key file and store safely on your computer.

      3. Description: Provide a brief description of the key.

    4. Click Save.

    Example Generating SSH Keys via PuTTYgen:

    1. Open WinSCP.

    2. Go to Tools → Run PuTTYgen.

    3. Click Generate and move the mouse to create randomness.

    4. Once the keys are generated, save the key pairs to your computer.

    5. The saved key files can be opened using a text editor like Notepad++. This allows you to easily copy the key data.

    6. Paste the copied data into the public/private key fields in ACE.

    GIF Demonstrates Generating SSH Keys via PuTTYgen Example


    Was this article helpful?

    Changing your password will log you out immediately. Use the new password to log back in.
    First name must have atleast 2 characters. Numbers and special characters are not allowed.
    Last name must have atleast 1 characters. Numbers and special characters are not allowed.
    Enter a valid email
    Enter a valid password
    Your profile has been successfully updated.
    ESC

    Eddy AI, facilitating knowledge discovery through conversational intelligence