How do I launch SSH or Shell Access tools?

Overview

SSH (Secure Shell) is a program to log into another computer/server over a network securely. It provides strong authentication and secure communications over insecure channels. Your login, commands, text are all encrypted when using ssh. You can login to your site via SSH through the control panel using a Java SSH client or directly from your computer using a third party SSH program.

SSH allows secure file transfer and remote logins over the internet. Your connection via SSH is encrypted for a secure connection. You can manage your SSH keys to allow automation when logging in via SSH. Using public key authentication is an alternative to password authentication. Since the private key must be held to authenticate, it is virtually impossible to brute force. You can Import existing keys, generate new keys, as well as manage/delete keys.

Java SSH Login

When using the Java SSH clients, you have your choice of two types of clients:

  • Connect using SSHTerm - SSH Term allows you to connect through public key or password authentication without downloading any software. Public key authentication require you to have a copy of your private key locally. This can be obtained by following the instructions in the "Manage SSH Keys" above.
  • Connect using Java Telnet Applet - Java Telnet Applet allows you to connect using password authentication without downloading any software.

To use either client, click on the appropriate link.

Third Party SSH Client Software

In addition to the Java SSH clients, you can login using a third party SSH program, two popular programs are listed below:

To connect use the following configuration settings:

Host or IP: yourdomain.com (your domain name)
Protocol: SSH
Port: 9394
Username and Password: Your control panel login information

Manage SSH Keys(Advanced)

Steps

  1. Click on the Generate a new Key link.
  2. Set the following:Click on the Generate Key button.
    • Key Name - Enter the key name you want to use. It can be anything specific to your personal preferences. (If you leave this option empty, it will default to key name "id_dsa").
    • Key Password - Enter a password you want to use for this key. You can leave this option blank if you do not want to use a password.
    • Key Type - Select either DSA or RSA from the drop down menu. RSA and DSA are encryption algorithms used to encrypt your key. DSA is faster for Key Generation and Signing and RSA is faster for Verification.
    • Key Size - Select the key size you want to use for this key. Your choices include (1024, 2048, 4096).
  3. If the key has been generated successfully, you will see a pop-up appear stating "Key Generation Complete!" Click on the OK button.
  4. Click on the Go Back link.
  5. When the page loads, you will see a "Public Keys" table with your newly public key containing the following information, split into three columns:
    • Name - This entry will be the Key name you chose in Step 2 above.
    • Authorization Status - If your key has not been authorized, it will state "not authorized" in this column. To authorize your key, follow the instructions in the "Manage Authorization" section below.
    • Actions - You have three choices:
      • Delete - Click on this link to delete the key.
      • View/Download - Click on this link to view or download the key.
      • Manage Authorization - Click on this link to authorize your key. Once the page loads, click on the "Authorize" button. You should receive a confirmation stating "KEY_NAME has been Authorized." Click on the "Go Back" link. Now when you view the Public Keys table, you should see "authorized' in the "Authorization Status" column for your new key.
  6. In addition to the "Public Keys" table, you will also see a "Private Keys" table with your newly public key containing the following information, split into two columns:Now that you have created a new key, review the following information:
    • Name - This entry will be the Key name you chose in Step 2 above.
    • Actions - You have three choices:
      • Delete - Click on this link to delete the key.
      • View/Download - Click on this link to view or download the key.

The public and private key are similar to a puzzle. They are created together to use during the login/authentication process. The public key resides on the server (the remote location) The private key resides locally on your computer/server. When you attempt to login to a server, the public and private key are compared. If they "match", then you will be allowed to login to the server location.

You can download the private/public keys here and import into PuTTY (or other SSH clients) if you prefer using something else for SSH connections. Or, if you have been using PuTTY, you can import the public/private keys by click on Import Key. You can also download your key in PuTTY's ppk format under View/Download.

  1. Click on the Go Back link.
  • 0 Users Found This Useful
Was this answer helpful?

Related Articles

What are some commonly used UNIX shell commands?

Creating a Directory   You can create a directory by using the mkdir command. For example, to...

How do I find information on other UNIX commands?

The UNIX command line interface is wonderful. With that power comes complexity if only in the...

How do I create a symbolic link?

A symbolic link is a pointer to another file or directory. It can be used just like the original...

How do I create a tar archive of a directory?

A common task in UNIX operating systems is creating an archive of many files or directories in a...

How do I find files and directories?

To search the current directory and all subdirectories for a folder or file, use the following...