Secure Remote Management via Secure Shell (SSH)

The SSH protocol allows you to access your web server's command line (CLI). This is particularly useful for tasks such as configuring CGI scripts, using tools like Git or Composer, and direct file management via the terminal.

Software Tip: While macOS and Linux have a built-in terminal, Windows users often require a client like PuTTY to establish a connection.

SSH Keys: The More Secure Choice

Instead of using a traditional password, the professional approach uses SSH key pairs. These consist of a public key (on the server) and a private key (on your computer). Access is granted only if both match.

Generating a New Key

  1. In cPanel, navigate to Security » SSH Access.
  2. Click on Manage SSH Keys and then Generate a New Key.
  3. Choose a name (default is id_rsa) and set a strong password (passphrase) to provide additional security for the key.
  4. Select RSA as the key type (recommended for high security) and a key length of at least 2048.
  5. Click Generate Key.
Important: Authorization Required
A newly created key will only work once it has been authorized. In the list of public keys, click Manage and then Authorize.

Key Management

➤ Import
If you have already generated a key on your PC, you can simply upload it via "Import Key".
➤ Download
To use the private key in your SSH client (e.g., PuTTY), you must export it to your computer via "View/Download".
➤ Delete
Revoke access immediately by deleting or deauthorizing a key. Existing connections will be terminated.

Connection Resources


Note: If SSH access is not active in your package,
please contact our support to check for activation eligibility.

Was this answer helpful? 0 Users Found This Useful (0 Votes)