Constellation Network
IntroductionFundamentalsFor DevelopersNode Validators
  • Index
  • Validator Node Guides
    • πŸ’°Delegated Staking
      • What is delegated staking?​
      • For Node Operators
      • Understanding Delegated Staking
      • Prerequisites
      • Create Delegated Staking Configuration
      • First Time Configuration
      • Modify Existing Configuration
      • Add/Update Delegating Staking Parameters
      • Update Delegated Staking
      • Duplicate Update
      • Status Command
    • 🚧Build Your Node
      • Create Discord Account
      • πŸ—’οΈNode Operator Notes
      • βš™οΈNode Specifications
      • 🚧Generic Build a VPS Guide
      • ☁️Cloud Provider Specific
        • 🚧Build AWS EC2 Instance
        • 🚧Build DigitalOcean Droplet
        • 🚧Build Hetzner Server
      • πŸš‰First Time Connection Guide
      • πŸ’½The nodectl utility
      • Download nodectl
      • πŸ—οΈTurn your VPS into a Node
        • 🚩Node Prerequisites
        • πŸ‡Quick Install Guide
        • 🎨Normal Install Guide
        • πŸ› οΈManual Installation
      • πŸ†Authorize to Join Hypergraph or metagaph
    • πŸ’°Collateralize Your Node
    • 1️⃣First Time Cluster Connection
    • πŸ’«Enable Auto Restart
    • πŸ“‚Operational Guides
      • ♻️Restart Validator Node Guide
      • 🐎Upgrade Tessellation Quick Start
      • 🏭Upgrade Tessellation Guide
      • πŸ—οΈReinstallation Guide
      • ♻️Backup/Restore a P12 KeyStore
      • πŸš‹Migrate V1 to V2 - P12 Keystore
      • πŸ›«Upgrade nodectl Version
      • 🚨Alerting & Reporting Setup Guide
    • πŸ› οΈTroubleshooting Guides
      • πŸ—οΈTroubleshoot SSH Connection
      • πŸ’½Troubleshoot nodectl upgrade
      • ⛰️Troubleshoot EdgePointDown Message
      • 🚨Troubleshoot Node Alerting
  • πŸ‘‘MainNet
    • MainNet & IntegrationNet Quick Start Guide
    • 🚧Upgrade Tessellation to v3
    • 🦌Migrate an IntegrationNet Node to MainNet
  • πŸ₯…IntegrationNet
    • πŸ§ͺIntegrationNet Quick Start Guide
  • Metagraphs
    • πŸšͺDor metagraph
      • πŸšͺDor Validator Onboard Guide
      • πŸšͺUnderstanding Rewards
      • πŸšͺTechnical Procedures
        • πŸšͺBuild Dor Validator Node
  • πŸ“šReferences
    • πŸ“šnodectl Command Reference
    • Firewall Settings Table
    • πŸ”SSH Remote Access
      • πŸ”‘Create SSH Keys
      • πŸ“Upload SSH Public Key
      • πŸ”Securing SSH Access
      • ♻️How to SSH into VPS
    • 🍴Node Fork Types
    • πŸ—οΈP12 Keystore
    • 🏐Tarball
    • πŸ’»Virtual Private Server
  • GitHub nodectl utility
  • Lattice Dashboard
Powered by GitBook

Main

  • Website
  • Get DAG
  • Explore Projects
  • Partners

Socials

  • Telegram
  • Discord
  • X (Twitter)

Tools

  • Wallet
  • DAG Explorer
  • Coingecko

Β© 2025 CONSTELLATION NETWORK

On this page
  • SSH Keys Explained
  • What Are SSH Keys?
  • Why Do We Use SSH?
  • How SSH Keys Work
  • Create SSH keys
  • Encryption in Action

Was this helpful?

Export as PDF
  1. References

SSH Remote Access

Secure Shell Concept and Guides

SSH Keys Explained


What Are SSH Keys?

When a Node Operator (Administrator) builds a VPS (Virtual Private Server) in the cloud, they need a secure method to access and administer that instance. This is typically done by connecting to the VPS from a local machine (e.g., a laptop or desktop) over the Internet.


Why Do We Use SSH?

Data traveling across the Internet is vulnerable to interception by malicious actors who may attempt to steal, monitor, or manipulate the connection. To defend against this, we use encryption to create a secure tunnel between the local and remote systems.


How SSH Keys Work

SSH keys are a pair of cryptographic keys:

  • A public key, which is shared with the remote server

  • A private key, which is kept securely on your local machine

These keys are used to:

  • Authenticate your identity

  • Establish an encrypted connection

  • Securely transmit commands and data


Create SSH keys


Encryption in Action

In the context of connecting to a cloud VPS:

  • The public key (stored on the VPS) is used to encrypt the data

  • The private key (on your local machine) is used to decrypt it

This ensures that only your local machineβ€”with the private keyβ€”can access and interpret the data sent by the server.


πŸ›‘οΈ SSH key authentication is significantly more secure than using a password alone and is the standard method for managing Constellation Network nodes in cloud environments.

PreviousFirewall Settings TableNextCreate SSH Keys

Last updated 1 month ago

Was this helpful?

πŸ”‘Create SSH Keys
πŸ“š
πŸ”
Page cover image