

The public key is now located in /home/demo/.ssh/id_rsa.pub The private key (identification) is now located in /home/demo/.ssh/id_rsa The entire key generation process looks like this: To leave the passphrase blank just hit enter. Doing so will require you to enter the passphrase each time you wish to login. You can press enter here, saving the file to the user home (in this case, my example user is called demo).Įnter passphrase (empty for no passphrase):įTP Today suggests that you do not use a passphrase. Once you have entered the command, you will get a few more questions:Įnter file in which to save the key (/home/demo/.ssh/id_rsa): The first step is to create the key pair on the client machine (there is a good chance that this will just be your computer): When the two match up, the system logs you in without the need for a password. You can place the public key on your FTP Today account, and then login by connecting to it with a client that already has the private key. Generating a key pair provides you with two long string of characters: a public and a private key. While a password can eventually be cracked with a brute force attack, SSH keys are nearly impossible to decipher by brute force alone. SSH keys provide a more secure way of logging into your FTP Today account with SFTP than using a password alone.
