Secure Authentication with SSH Keys
Every time you log into a server with a password, that password travels over the network. SSH keys eliminate this risk entirely by using a pair of cryptographic files to prove your identity instead. Think of it like a key and a lock. You keep the key (your private key) on your computer. You put the lock (your public key) on your server. When you connect, the server checks whether your key fits its lock. If it does, you are in — no password needed, nothing sent over the wire that could be intercepted. The FREAKHOSTING VPS Control Panel lets you store up to 50 public keys on your account and inject them into any server during the build process. That means passwordless login from the moment your server is ready.Difficulty
Intermediate
Time
5 Minutes
Viewing Your SSH Keys
Review Your Keys
The SSH Keys page shows a heading like “0 slots used, 50 remaining” along with a list of all your stored public keys. Each account can hold up to 50 SSH keys — more than enough for separate keys on your work laptop, home desktop, tablet, and any CI/CD pipelines you run.If you have not added any keys yet, you will see a “No SSH Keys found” message with an Add Key button ready to go.
Generating an SSH Key on Your Computer
If you do not have an SSH key yet, here is how to create one on your local machine. We recommend generating keys locally rather than in the panel, because it means your private key never leaves your computer.- Windows 10/11
- macOS
- Linux
Open PowerShell or Windows Terminal and run:When prompted:Copy the public key to your clipboard:
- File location: Press Enter to accept the default (
C:\Users\YourName\.ssh\id_ed25519) - Passphrase: Type a passphrase for extra security (recommended) or press Enter for none
Adding Your SSH Key to the Control Panel
Now that you have a public key on your clipboard, upload it to FREAKHOSTING:Enter a Name
Type a descriptive Name for your key so you can identify it later — something like “Work Laptop” or “Home Desktop.” You can also click Random Name? to auto-generate a name if you prefer.
Paste Your Public Key
In the Public Key field, paste the contents of your public key file. It should look something like:or if you are using RSA:Important: Make sure you paste the public key (the
.pub file), not the private key. The private key should never be uploaded anywhere.Generating a Key Pair in the Control Panel
If you prefer not to use the command line, the control panel can generate a key pair for you:Generate the Key Pair
Click the Generate Key Pair button. The system will create a new 2048-bit RSA key pair.
Download Your Private Key Immediately
A dialog will appear containing your private key. Download and save this right now — it is only displayed once and cannot be recovered later.Save it to a secure location on your computer:
- macOS / Linux:
~/.ssh/directory - Windows:
C:\Users\YourName\.ssh\directory
Using SSH Keys with Your VPS
SSH keys stored in the control panel can be selected during the VPS build (or rebuild) process. When you build or rebuild a server, you will see an option to inject one or more of your stored SSH keys. This enables passwordless SSH login from the moment your server finishes building.- Linux / macOS
- Windows (PowerShell)
- PuTTY (Windows)
Connect using the private key:Tip: Add this to your Then simply run:
~/.ssh/config to avoid typing the key path every time:ssh myserverRemoving an SSH Key
To remove a stored SSH key from your account, locate the key in your SSH Keys list and click the Delete button next to it. Important to understand: Removing a key from the control panel does not remove it from servers where it has already been installed. It only prevents the key from being injected into future builds. If you want to revoke access to an existing server, you will need to manually remove the key from the server’s~/.ssh/authorized_keys file as well.
Understanding the 50-Key Limit
Your account can store up to 50 SSH keys. This limit is per account, not per server. In practice, 50 slots is generous — you might use a handful for your personal devices and a few more for CI/CD systems or deployment scripts. If you find yourself approaching the limit, remove old keys from devices you no longer use.What is the difference between a public key and a private key?
What is the difference between a public key and a private key?
An SSH key pair has two parts. The public key is like a lock — you put it on every server you want to access. The private key is the only key that opens that lock, and it stays on your computer. When you connect, the server tests whether your private key matches the public key it has on file. If it does, you are authenticated — no password involved. The private key never leaves your machine during this process.
Can I use the same SSH key for multiple servers?
Can I use the same SSH key for multiple servers?
Yes, and this is the most common approach. You use one key pair across all your servers, so you only need to manage a single private key on your device. Each server simply gets a copy of your public key.
What key types are supported?
What key types are supported?
The control panel generates RSA 2048-bit keys when you use the built-in generator. When uploading your own keys, RSA, Ed25519, and ECDSA key types are all supported. We recommend Ed25519 for new keys — it is faster, more secure, and produces shorter keys.
Should I add a passphrase to my SSH key?
Should I add a passphrase to my SSH key?
Yes, adding a passphrase is recommended. A passphrase encrypts your private key file so that even if someone copies it from your computer, they cannot use it without knowing the passphrase. It is a second layer of defense, just like 2FA for your passwords.
Need Extra Help?
If you encounter any issues, our support team is ready to assist:- Live Chat: Quick assistance via our website.
- Support Ticket: Open a Ticket
- Discord: Join our Community
- Email: support@freakhosting.com
Last Updated: March 2026 | VPS Support: SSH key management simplified.