Secure Remote Management via Secure Shell (SSH)
The SSH protocol allows you to access your web server's command line (CLI). This is particularly useful for tasks such as configuring CGI scripts, using tools like Git or Composer, and direct file management via the terminal.
SSH Keys: The More Secure Choice
Instead of using a traditional password, the professional approach uses SSH key pairs. These consist of a public key (on the server) and a private key (on your computer). Access is granted only if both match.
Generating a New Key
- In cPanel, navigate to Security » SSH Access.
- Click on Manage SSH Keys and then Generate a New Key.
- Choose a name (default is
id_rsa) and set a strong password (passphrase) to provide additional security for the key. - Select RSA as the key type (recommended for high security) and a key length of at least 2048.
- Click Generate Key.
A newly created key will only work once it has been authorized. In the list of public keys, click Manage and then Authorize.
Key Management
If you have already generated a key on your PC, you can simply upload it via "Import Key".
To use the private key in your SSH client (e.g., PuTTY), you must export it to your computer via "View/Download".
Revoke access immediately by deleting or deauthorizing a key. Existing connections will be terminated.
Connection Resources
Note: If SSH access is not active in your package,
please contact our support to check for activation eligibility.