Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

About SSH

...

Generating a key pair provides you with two long string strings of characters: a public and a private key. You can place the public key on any server, and then unlock it by connecting to it with a client that already has the private key. When the two matches match up, the system unlocks without the need for a password. You can increase security even more by protecting the private key with a passphrase.

...

To protect the private key, it should be generated locally on a user’s machine (e.g. using PuTTYgen) and stored encrypted by a passphrase. The passphrase should be long enough (that’s why it’s called passphrase, not password) to withstand a brute-force attack for a reasonably long time, in case an attacker obtains the private key file.

Please note: only RSA private keys in PEM format are supported!

User Public Key

A user public key is a counterpart to the user's private key. They are generated at the same time. The user public key can be safely revealed to anyone, without compromising user identity.

...

  1. Repository ssh link

  2. Passphrase. Leave it empty if your key is not protected by passa passphrase

  3. Click the “Choose file” button to load ssh private key from the disk

  4. Alternatively, you can copy your private key into textfieldthe text field