SSH Access Interface in cPanel

cPanel Tutorials, FAQs, How To Guides
Over 75 different hosting features

How to connect with the SSH protocol

Updated: September 6, 2022
By: RSH Web Editorial Staff
cPanel Tutorials SSH
Menu

Security > SSH Access

With this feature it provides information about how to connect to another web server via the SSH (secure shell) network protocol

Many modern operating systems, such as macOS and Linux distributions, include SSH.

If you use Microsoft Windows® to connect to your server, you must use an SSH client, such as PuTTY, to log in to your server.

Many Unix-based operating systems include standardized commands. For a list of standardized Unix-based (POSIX) commands, see the GNU Coreutils documentation.

Note: Not all hosting providers allow shell access.

To use PuTTY to connect to your server via SSH

To log in to a server via SSH with PuTTY and a public key

To log in to your server with a password via SSH using macOS

Email

Manage SSH keys

This section of cPanel’s SSH Access interface allows you to create, import, manage, and remove SSH keys. The system will use these keys when you confirm that a specific computer has the right to access your website’s information with SSH.

Generate a New Key

Use this section of the interface to create new SSH key pairs, which include a public key and a private key.

To generate a new SSH key pair, perform the following steps:

1) Click Manage SSH Keys.

2) Click Generate a New Key.

3) To use a custom key name, enter the key name in the Key Name (This value defaults to id_rsa): text box.

Note: If you use a custom key name, you must manually specify the SSH key when you log in to the server.

4) Enter and confirm the new password in the appropriate text boxes.

Note: This step is optional if your hosting provider sets the SSH Keys setting to 0 in WHM’s Password Strength Configuration interface.
The system evaluates the password that you enter on a scale of 100 points. 0 indicates a weak password, while 100 indicates a very secure password.
Some web hosts require a minimum password strength. A green password Strength meter indicates that the password is equal to or greater than the required password strength.
Click Password Generator to generate a strong password. For more information, read our Password & Security documentation.

5) Select the desired key type.
◦ DSA keys provide quicker key generation and signing times.
◦ RSA keys provide quicker verification times.

6) Select the desired key size.

Note: Greater key sizes provide more security, but they result in larger file sizes and slower authentication times.

7) Click Generate Key. The interface will display the saved location of the key.

Important: For the new SSH key to function, you must authorize the SSH key. For more information, read the Manage your keys section.

Import Key

To import an existing SSH key, perform the following steps:

1) Click Manage SSH Keys.

2) Click Import Key.

3) To use a custom key name, enter the key name in the Choose a name for this key (defaults to id_dsa) text box.

Important: If you use a custom key name, you must manually specify the SSH key when you log in to the server.

4) Paste the public and private keys into the appropriate text boxes.

5) Click Import.

Manage your keys

The Public Keys and Private Keys tables display the following information about your existing keys:

  • • Name - The key’s name. Public and private keys use the same key name.
  • • Authorization Status — Whether you authorized the key.

Important: You must authorize new keys before you attempt to use them.

Note: This column only displays in the Public Keys table.

  • • Actions - You can perform the following actions:
  • • Delete Key - Click to delete the key, and then click Yes to confirm that you wish to delete the key.
  • • View/Download - Click to view or download the key. To download the key, save the contents of the Public SSH Key text box to your computer.
  • • Manage - Click to manage authorization for the key. A new interface will appear. Click Authorize to authorize the key, or Deauthorize to revoke authorization for the key.

Note: You can only perform this action for public keys.

After you deauthorize a key, that key’s users cannot log in with the associated private key.

Tweet  Share  Pin  Tumble  Email

We welcome your comments, questions, corrections and additional information relating to this article. Please be aware that off-topic comments will be deleted.
If you need specific help with your account, feel free to contact us anytime
Thank you

More Articles Of Interest

As the leading provider of cPanel hosting solutions, RSH Web Services provides a full range of hosting products for any business, personal or professional website. From domain name registration to high security and easy management