![]() This will be the filename for both the public key, and the private key. In fact, however, both a 'public' key, and a 'private' key will be generated at the same time. "The system will now generate a public key:" Under the heading 'Manage SSH Keys', click the button "Manage SSH Keys".Īt the page 'Manage SSH Keys', under the heading 'Generate a new key.',Īt the page 'SSH Key Generator', it displays: If they match, SSH will allow you to log in." When you attempt to log in to the remote server, SSH compares the public and private keys. Public keys reside on the remote server, while private keys reside on your local computer or server. "Public and private keys are created together. ![]() The paragraph under the heading 'Manage SSH Keys' explains the basics of using a SSH key: The 'Password:' is the password that you used for logging in to your web-hosting account to get to your Control Panel. Make note of the page-bottom 'Hostname:', and 'Username', because you will need those two items for the programs you will use later to connect to the webhost server, as for example, 'Filezilla' for SFTP, and 'PuTTY' for SSH. Near the bottom it will have the heading 'SSH Access is: Enabled'. The page 'SSH' will reload, and will be different from what is was. Refresh the page by clicking the browser-top icon "⟳" or by pressing the keyboard key 'F5'. If you just enabled SSH access, then you need to refresh the page 'SSH'. The page 'SSH Access Settings' reloads, and should display 'SSH Shell settings set to /usr/local/cpanel/bin/jailshell successfully.' (or something similar).Ĭlose the browser tab (or window) for this 'SSH Access Settings' page. One is for turning SSH access ON ('Real shell (Bash)', and one choice is for turning it OFF ('No shell'). ![]() If the box to the right of 'SSH Status' is displaying 'No shell' (or something similar), click the downward pointing arrow to the right of 'No shell', and in the drop-down list, click "Real shell (bash)" (or something similar). That will open a new browser tab (or possibly a new browser window) at the page 'SSH Access Settings'. You need to have SSH access enabled, so, if it is not yet enabled, click the button "Manage SSH Access". If, on the other hand, near the page bottom you have the heading 'SSH Access is: Enabled', then SSH Access has previously been enabled for your webhosing account, and you can jump down to section At the Page 'SSH', with SSH Enabled" ⤵Įnabling SSH Access (if it is not already enabled) If the first sentence of the second paragraph starts with,"For security reasons, shell access is not enabled by default.", then you have not yet enabled SSH access for your webhosting account, but you will in the next section. Have patience for a few seconds while the system is granting you access to the SSH page. If icons are not displaying under the heading 'Security', click that blue "Security" bar to expand it so that the various security icons display below the security bar. If you are on a mobile device, or if your browser window is narrow, the 'Security' heading will be nearer to the page bottom. On the Control Panel page, look on the right-side for the heading 'Security'. In the address-bar, and make sure that the URL begins with ' and not just ' There should always be an 's' at the end of 'http' to indicate that you are using a 'secure' connection, and that you will be sending information in an encoded form. When you are at the Control Panel page, look at the top of your browser window How to tell if you are on a Secure webpage. The password is the one for the primary webhosting account. To login, you can use your domain name as the 'username'. If you use 'Bluehost' click the following link, which will then first have you login,Īnd then will take you directly to the Control Panel. Login to your webhost, and go to the 'Control Panel' These instructions will use as an example the 'Control Panel' at the webhost 'Bluehost', and yet, hopefully, your webhost will also have a Control Panel with similar, if not identical, capabilities and interface. You can then communicate with your webhost securely, or upload and download files securely. These are necessary for you to use, for example, a SSH client ('S'ecure 'Sh'ell program) like PuTTY for Windows, or for you to use a SFTP client ('Secure File Transfer Protocol' program) on your computer, since FTP (using a 'File Transfer Protocol' program) is not secure. ![]() When you are done, you will have created both a 'public key', and a 'private key' at your webhost, and you will have downloaded a copy of the 'private key' to your computer.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |