πSSH Remote Access
Secure Shell Concept and Guides
SSH Keys Explained
What Are SSH Keys?
When a Node Operator (Administrator) builds a VPS (Virtual Private Server) in the cloud, they need a secure method to access and administer that instance. This is typically done by connecting to the VPS from a local machine (e.g., a laptop or desktop) over the Internet.
Why Do We Use SSH?
Data traveling across the Internet is vulnerable to interception by malicious actors who may attempt to steal, monitor, or manipulate the connection. To defend against this, we use encryption to create a secure tunnel between the local and remote systems.
How SSH Keys Work
SSH keys are a pair of cryptographic keys:
A public key, which is shared with the remote server
A private key, which is kept securely on your local machine
These keys are used to:
Authenticate your identity
Establish an encrypted connection
Securely transmit commands and data
Create SSH keys
πCreate SSH KeysEncryption in Action
In the context of connecting to a cloud VPS:
The public key (stored on the VPS) is used to encrypt the data
The private key (on your local machine) is used to decrypt it
This ensures that only your local machineβwith the private keyβcan access and interpret the data sent by the server.
π‘οΈ SSH key authentication is significantly more secure than using a password alone and is the standard method for managing Constellation Network nodes in cloud environments.
Last updated
Was this helpful?