SSH Key

Last updated: 2020-02-25 11:17:33

PDF

To ensure the security and reliability of the instance, Tencent Cloud provides two encrypted login methods: Password login Log in with the SSH key pair. This document describes the configuration of SSH key pair login.
Custom configuration Linux Cloud Virtual Machine You can choose the SSH key to encrypt the login method for Cloud Virtual Machine.

SSH Key Overview

Tencent Cloud allows the use of public key cryptography to encrypt and decrypt login information for Linux instances. Public key cryptography uses a public key to encrypt a piece of data, such as a password, and the recipient can then use a private key to decrypt the data. Public and private keys are called key pairs. Users can connect with Cloud Virtual Machine securely through a key pair, which is a more secure way to log in to Cloud Virtual Machine than a conventional password.

Tencent Cloud will only store public keys. You need to store private keys. Anyone with your private key can decrypt your login information, so it's important to keep your private key in a secure location.

Features and Advantages

Compare to the traditional verification method involving user name and password, SSH key has the following advantages:
Login verification with SSH key offers a higher security to prevent brute force attacks.
Login with SSH key makes it more convenient for you to login to your instance by making simple configurations on the console and local client, without the need to enter the password again in case of re-login.

Use Limits

Only supported for Linux instances.
Tencent Cloud will not retain your private key information. You need to click Download To obtain the private key within 10 minutes after you have created an SSH key, and keep it properly.
To ensure data security, you need to shut the instance down before the key can be loaded.

Use cases

For more information, please see SSH Key operation guide .