Secure Server Authentication
Secure Shell (SSH) provides a encrypted way to access your server’s command line. While traditional password authentication is available, using SSH Keys is significantly more secure and convenient. It uses a pair of cryptographic keys (Public and Private) to verify your identity without sending a password over the network.Difficulty
Advanced
Time
5 Minutes
Uploading a Public Key
To use SSH key authentication, you must upload your Public Key (id_rsa.pub or similar) to the Web Panel.
Access SSH Manager
Log in to the Web Panel and go to the Security tab, then select SSH keys.
Paste Your Key
- Name: Give the key a descriptive name (e.g.,
My Laptop). - Key Content: Paste the entire contents of your public key. This usually starts with
ssh-rsa,ssh-ed25519, orecdsa-sha2-nistp256.
Connecting via SSH
Once your key is uploaded, you can connect using a terminal (macOS/Linux) or a client like PuTTY (Windows). Command Line Example:ssh [email protected]
Connection Details:
- Host: Your domain or the Main IP.
- Port: Default SSH port 22.
- User: Your hosting account username.
Benefits of SSH Keys
Brute-Force Protection
Brute-Force Protection
Passwords can be guessed or “cracked” by automated bots. SSH keys are virtually impossible to brute-force because of their extreme cryptographic complexity.
Passwordless Convenience
Passwordless Convenience
Once set up, you can log in instantly without typing your password every time. This is especially useful for developers who frequently use terminal commands or automated deployment scripts.
Need Extra Help?
If you encounter any issues, our support team is ready to assist:- Live Chat: Quick assistance via our website.
- Support Ticket: Open a Ticket
- Discord: Join our Community
Last Updated: January 2026 | FREAKHOSTING: Secure Terminal Infrastructure.