{"id":29935,"date":"2019-06-10T13:25:45","date_gmt":"2019-06-10T18:25:45","guid":{"rendered":"https:\/\/www.rosehosting.com\/blog\/?p=29935"},"modified":"2022-12-15T06:34:35","modified_gmt":"2022-12-15T12:34:35","slug":"how-to-use-a-private-key-and-putty-to-log-into-your-server-securely","status":"publish","type":"post","link":"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/","title":{"rendered":"How to Use a Private Key and PuTTY to Log into Your Server Securely"},"content":{"rendered":"<div id=\"bsf_rt_marker\"><\/div><p><img decoding=\"async\" class=\"alignnone size-full wp-image-29937\" src=\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/02\/putty-login-security.jpg\" alt=\"Improve Login Security Using Private Keys and PuTTY\" width=\"742\" height=\"372\" srcset=\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/02\/putty-login-security.jpg 742w, https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/02\/putty-login-security-150x75.jpg 150w, https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/02\/putty-login-security-300x150.jpg 300w\" sizes=\"(max-width: 742px) 100vw, 742px\" \/><\/p>\n<p>With security becoming increasingly important in today&#8217;s modern world of information theft and privacy concerns, keeping your server safe and secure has almost become a necessity. While several methods exist to properly secure your server, from using a long password to two-factor authentication, they can be quite a hassle to set up and use on a day-to-day basis. However, private keys offer a good balance between convenience and security.<\/p>\n<p><!--more--><\/p>\n<p class=\"p1\"><span class=\"s1\">In an earlier article, we saw how to <a href=\"https:\/\/www.rosehosting.com\/blog\/how-to-set-up-ssh-keys-on-ubuntu-16-04\/\">generate a private\/public key pair<\/a><\/span><span class=\"s1\">. We also saw that we need to use the &#8220;puttygen&#8221; tool to convert it into a format that&#8217;s accepted by a lot of software programs like WinSCP for SFTP access, and so on.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">In this article, we&#8217;ll show you how to use a private key to allow you to log into a server without the need for typing in a password. This comes with several benefits. In order to set up logging in using a private key on your server, you will have to have done the following first in order for this to work:<\/span><\/p>\n<ol class=\"ol1\">\n<li class=\"li1\"><span class=\"s1\">Generated a private\/public key pair on your server<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">If via the command line, you&#8217;ve put your private key into the &#8220;authorized_keys&#8221; file<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">You&#8217;ve downloaded your private key<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">You&#8217;ve converted it to the &#8220;PPK&#8221; format<\/span><\/li>\n<\/ol>\n<p>This tutorial will be done on a <a href=\"https:\/\/www.rosehosting.com\/vps-hosting.html\">Linux VPS<\/a>.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_1 counter-hierarchy ez-toc-counter ez-toc-transparent ez-toc-container-direction\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-69c31baf53fb6\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69c31baf53fb6\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/#Why-Not-Use-a-Password-Instead\" >Why Not Use a Password Instead?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/#Step-1-Downloading-PuTTY\" >Step 1: Downloading PuTTY<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/#Step-2-Configuring-Your-Credentials-with-PuTTY\" >Step 2: Configuring Your Credentials with PuTTY<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/#Step-3-Specify-the-Private-Key\" >Step 3: Specify the Private Key<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"p2\"><span class=\"ez-toc-section\" id=\"Why-Not-Use-a-Password-Instead\"><\/span><span class=\"s1\">Why Not Use a Password Instead?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">When logging in via SSH, you can choose to use a password or a key file. Authentication usually hinges on one or more of three things:<\/span><\/p>\n<ol class=\"ol1\">\n<li class=\"li1\"><span class=\"s1\">Something you <i>know<\/i><\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">Something you <i>have<\/i><\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">Something you <i>are<\/i><\/span><\/li>\n<\/ol>\n<p class=\"p1\"><span class=\"s1\">A password belongs to the first category &#8211; something you know. And something you know can also be known by other people. Something you know can also be guessed. In general, passwords are slowly being phased out for serious security applications &#8211; or at the very least, they&#8217;re being combined with other forms of authentication.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Something you <i>have,<\/i> on the other hand, is a lot more difficult to fake. A private key on your local computer isn&#8217;t as vulnerable as a password. Passwords are also susceptible to &#8220;man-in-the-middle&#8221; attacks, where a hacker can intercept your password in plain text when you connect to the server and then use it whenever they want.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">A private key connection,\u00a0however, <i>doesn&#8217;t<\/i> allow man-in-the-middle attacks. Your private key is never sent over the public network. By working through a complex sequence of cryptographic algorithms, SSH key authentication is completely safe from snooping.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">For these reasons, you want to use private key authentication whenever you can.<\/span><\/p>\n<h2 class=\"p2\"><span class=\"ez-toc-section\" id=\"Step-1-Downloading-PuTTY\"><\/span><span class=\"s1\">Step 1: Downloading PuTTY<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">A prerequisite to using private keys to log in would be that you need to convert the private key you downloaded from your server into a &#8220;PPK&#8221; file for use with 3rd party programs. One such program is called PuTTY, and it&#8217;s something of a standard connection tool in the server world. You can <a href=\"https:\/\/www.chiark.greenend.org.uk\/~sgtatham\/putty\/latest.html\"><span class=\"s2\">download it from here<\/span><\/a>, and grab the version that suits you best, like this:<\/span><\/p>\n<figure id=\"attachment_814\" aria-describedby=\"caption-attachment-814\" style=\"width: 616px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"size-full wp-image-814\" src=\"https:\/\/linuxhostsupport.com\/blog\/wp-content\/uploads\/2019\/02\/Download-PuTTY.jpg\" alt=\"Download PuTTY\" width=\"626\" height=\"369\" \/><figcaption id=\"caption-attachment-814\" class=\"wp-caption-text\">Download PuTTY From their Website<\/figcaption><\/figure>\n<p class=\"p1\"><span class=\"s1\">It&#8217;s a standalone program and doesn&#8217;t require any installation process. So once you download it, you can just run it and get started right away.<\/span><\/p>\n<h2 class=\"p2\"><span class=\"ez-toc-section\" id=\"Step-2-Configuring-Your-Credentials-with-PuTTY\"><\/span><span class=\"s1\">Step 2: Configuring Your Credentials with PuTTY<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">To set up PuTTY, run the executable file and after the interface opens, click the &#8220;Sessions&#8221; tab on the left (it should be selected by default). Now enter your hostname and the port number. Normally the port number for SSH is 2222, but our test server is set to use a custom port to make it difficult for attackers to randomly make attempts to log in. Just replace 7022 from the screenshot below with the port number used by your server:<\/span><\/p>\n<figure id=\"attachment_815\" aria-describedby=\"caption-attachment-815\" style=\"width: 607px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"size-full wp-image-815\" src=\"https:\/\/linuxhostsupport.com\/blog\/wp-content\/uploads\/2019\/02\/PuTTY-Initial-Configuration.jpg\" alt=\"PuTTY Initial Configuration\" width=\"617\" height=\"524\" \/><figcaption id=\"caption-attachment-815\" class=\"wp-caption-text\">Initial Setup of PuTTY<\/figcaption><\/figure>\n<p class=\"p1\"><span class=\"s1\">If you&#8217;re hosting with a hosting provider that has a custom SSH port, make sure you check with them as to what their port is.<\/span><\/p>\n<h2 class=\"p2\"><span class=\"ez-toc-section\" id=\"Step-3-Specify-the-Private-Key\"><\/span><span class=\"s1\">Step 3: Specify the Private Key<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">Now expand &#8220;SSH&#8221; on the left-hand side, and click &#8220;Auth&#8221;, as shown here:<\/span><\/p>\n<figure id=\"attachment_816\" aria-describedby=\"caption-attachment-816\" style=\"width: 617px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"size-full wp-image-816\" src=\"https:\/\/linuxhostsupport.com\/blog\/wp-content\/uploads\/2019\/02\/Select-Private-Key.jpg\" alt=\"Select Private Key\" width=\"627\" height=\"308\" \/><figcaption id=\"caption-attachment-816\" class=\"wp-caption-text\">Select the Private Key from its Location<\/figcaption><\/figure>\n<p class=\"p1\"><span class=\"s1\">Click &#8220;Browse&#8221; and navigate to the location of your private key. Select it (it should be in the .PPK format) and you&#8217;re done! Click &#8220;Open&#8221; and an SSH window should open up. Enter the user<\/span><span class=\"s1\">name with which you generated your private key and if all goes well, it should log in like this:<\/span><\/p>\n<figure id=\"attachment_817\" aria-describedby=\"caption-attachment-817\" style=\"width: 1424px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"size-full wp-image-817\" src=\"https:\/\/linuxhostsupport.com\/blog\/wp-content\/uploads\/2019\/02\/Logging-in-with-Private-Key.jpg\" alt=\"Logging in With Private Key\" width=\"1434\" height=\"336\" \/><figcaption id=\"caption-attachment-817\" class=\"wp-caption-text\">Logging in With Your Private Key<\/figcaption><\/figure>\n<p class=\"p1\"><span class=\"s1\">And that&#8217;s it &#8211; you&#8217;ve successfully opened an SSH session with private key authentication using PuTTY.<\/span><\/p>\n<hr \/>\n<p>Of course, you don\u2019t have to create and set up your private and public key pair on your Ubuntu 16.04 VPS if you use one of our <a href=\"https:\/\/www.rosehosting.com\/vps-hosting.html\">Linux VPS Hosting<\/a> services, in which case you can simply ask our expert Linux admins to set up the SSH keys for you. They are available 24&#215;7 and will take care of your request immediately.<\/p>\n<p><span style=\"color: #ff0000;\"><strong>PS<\/strong>.<\/span> If you liked this post, please share it with your friends on the social networks using the share shortcuts below, or simply leave a comment in the comments section. Thanks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With security becoming increasingly important in today&#8217;s modern world of information theft and privacy concerns, keeping your server safe and &#8230; <\/p>\n<p class=\"read-more-container\"><a title=\"How to Use a Private Key and PuTTY to Log into Your Server Securely\" class=\"read-more button\" href=\"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/#more-29935\" aria-label=\"Read more about How to Use a Private Key and PuTTY to Log into Your Server Securely\">Read More<\/a><\/p>\n","protected":false},"author":4,"featured_media":29937,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1703,13],"tags":[1784,208,65,68],"class_list":["post-29935","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-tutorials","tag-private-key","tag-putty","tag-security","tag-ssh","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-33"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Use a Private Key and PuTTY to Log into Your Server Securely | RoseHosting<\/title>\n<meta name=\"description\" content=\"How to Use a Private Key and PuTTY to Log into Your Server Securely | RoseHosting\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Use a Private Key and PuTTY to Log into Your Server Securely\" \/>\n<meta property=\"og:description\" content=\"How to Use a Private Key and PuTTY to Log into Your Server Securely | RoseHosting\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/\" \/>\n<meta property=\"og:site_name\" content=\"RoseHosting\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RoseHosting\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/rosehosting.helpdesk\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-10T18:25:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-15T12:34:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/02\/putty-login-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"742\" \/>\n\t<meta property=\"og:image:height\" content=\"372\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jeff Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@rosehosting\" \/>\n<meta name=\"twitter:site\" content=\"@rosehosting\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Wilson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/\"},\"author\":{\"name\":\"Jeff Wilson\",\"@id\":\"https:\/\/www.rosehosting.com\/blog\/#\/schema\/person\/7ce77a842fa6a9a7f8efa186f2353713\"},\"headline\":\"How to Use a Private Key and PuTTY to Log into Your Server Securely\",\"datePublished\":\"2019-06-10T18:25:45+00:00\",\"dateModified\":\"2022-12-15T12:34:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/\"},\"wordCount\":892,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.rosehosting.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/02\/putty-login-security.jpg\",\"keywords\":[\"private key\",\"putty\",\"security\",\"ssh\"],\"articleSection\":[\"Security\",\"Tutorials\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/\",\"url\":\"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/\",\"name\":\"How to Use a Private Key and PuTTY to Log into Your Server Securely | RoseHosting\",\"isPartOf\":{\"@id\":\"https:\/\/www.rosehosting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/02\/putty-login-security.jpg\",\"datePublished\":\"2019-06-10T18:25:45+00:00\",\"dateModified\":\"2022-12-15T12:34:35+00:00\",\"description\":\"How to Use a Private Key and PuTTY to Log into Your Server Securely | RoseHosting\",\"breadcrumb\":{\"@id\":\"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/#primaryimage\",\"url\":\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/02\/putty-login-security.jpg\",\"contentUrl\":\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/02\/putty-login-security.jpg\",\"width\":742,\"height\":372,\"caption\":\"Improve Login Security Using Private Keys and PuTTY\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.rosehosting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Use a Private Key and PuTTY to Log into Your Server Securely\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.rosehosting.com\/blog\/#website\",\"url\":\"https:\/\/www.rosehosting.com\/blog\/\",\"name\":\"RoseHosting.com\",\"description\":\"Premium Linux Tutorials Since 2001\",\"publisher\":{\"@id\":\"https:\/\/www.rosehosting.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.rosehosting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.rosehosting.com\/blog\/#organization\",\"name\":\"RoseHosting\",\"url\":\"https:\/\/www.rosehosting.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.rosehosting.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2022\/03\/android-chrome-192x192-1.png\",\"contentUrl\":\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2022\/03\/android-chrome-192x192-1.png\",\"width\":192,\"height\":192,\"caption\":\"RoseHosting\"},\"image\":{\"@id\":\"https:\/\/www.rosehosting.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/RoseHosting\",\"https:\/\/x.com\/rosehosting\",\"https:\/\/www.linkedin.com\/in\/rosehosting\/\"],\"description\":\"RoseHosting is a leading Linux hosting provider, serving thousands of clients world-wide since 2001.\",\"email\":\"info@rosehosting.com\",\"telephone\":\"(314) 275-0414\",\"legalName\":\"Rose Web Services LLC\",\"foundingDate\":\"2001-04-02\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.rosehosting.com\/blog\/#\/schema\/person\/7ce77a842fa6a9a7f8efa186f2353713\",\"name\":\"Jeff Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/0985fed6af04cc60703d2ecf27c65dfa373e0ca00eb21c0b03477e099ea3f99f?s=96&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0985fed6af04cc60703d2ecf27c65dfa373e0ca00eb21c0b03477e099ea3f99f?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0985fed6af04cc60703d2ecf27c65dfa373e0ca00eb21c0b03477e099ea3f99f?s=96&r=g\",\"caption\":\"Jeff Wilson\"},\"description\":\"An experienced Linux veteran with many years of experience. Helping other Linux admins with frequent Linux and business-related blog posts on the RoseHosting blog. Techie by choice. Loving nature and travel. Happily married and father of two lovely children.\",\"sameAs\":[\"https:\/\/www.rosehosting.com\",\"https:\/\/www.facebook.com\/rosehosting.helpdesk\"],\"url\":\"https:\/\/www.rosehosting.com\/blog\/author\/jwilson\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Use a Private Key and PuTTY to Log into Your Server Securely | RoseHosting","description":"How to Use a Private Key and PuTTY to Log into Your Server Securely | RoseHosting","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/","og_locale":"en_US","og_type":"article","og_title":"How to Use a Private Key and PuTTY to Log into Your Server Securely","og_description":"How to Use a Private Key and PuTTY to Log into Your Server Securely | RoseHosting","og_url":"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/","og_site_name":"RoseHosting","article_publisher":"https:\/\/www.facebook.com\/RoseHosting","article_author":"https:\/\/www.facebook.com\/rosehosting.helpdesk","article_published_time":"2019-06-10T18:25:45+00:00","article_modified_time":"2022-12-15T12:34:35+00:00","og_image":[{"width":742,"height":372,"url":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/02\/putty-login-security.jpg","type":"image\/jpeg"}],"author":"Jeff Wilson","twitter_card":"summary_large_image","twitter_creator":"@rosehosting","twitter_site":"@rosehosting","twitter_misc":{"Written by":"Jeff Wilson","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/#article","isPartOf":{"@id":"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/"},"author":{"name":"Jeff Wilson","@id":"https:\/\/www.rosehosting.com\/blog\/#\/schema\/person\/7ce77a842fa6a9a7f8efa186f2353713"},"headline":"How to Use a Private Key and PuTTY to Log into Your Server Securely","datePublished":"2019-06-10T18:25:45+00:00","dateModified":"2022-12-15T12:34:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/"},"wordCount":892,"commentCount":1,"publisher":{"@id":"https:\/\/www.rosehosting.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/02\/putty-login-security.jpg","keywords":["private key","putty","security","ssh"],"articleSection":["Security","Tutorials"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/","url":"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/","name":"How to Use a Private Key and PuTTY to Log into Your Server Securely | RoseHosting","isPartOf":{"@id":"https:\/\/www.rosehosting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/#primaryimage"},"image":{"@id":"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/02\/putty-login-security.jpg","datePublished":"2019-06-10T18:25:45+00:00","dateModified":"2022-12-15T12:34:35+00:00","description":"How to Use a Private Key and PuTTY to Log into Your Server Securely | RoseHosting","breadcrumb":{"@id":"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/#primaryimage","url":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/02\/putty-login-security.jpg","contentUrl":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2019\/02\/putty-login-security.jpg","width":742,"height":372,"caption":"Improve Login Security Using Private Keys and PuTTY"},{"@type":"BreadcrumbList","@id":"https:\/\/www.rosehosting.com\/blog\/how-to-use-a-private-key-and-putty-to-log-into-your-server-securely\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rosehosting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Use a Private Key and PuTTY to Log into Your Server Securely"}]},{"@type":"WebSite","@id":"https:\/\/www.rosehosting.com\/blog\/#website","url":"https:\/\/www.rosehosting.com\/blog\/","name":"RoseHosting.com","description":"Premium Linux Tutorials Since 2001","publisher":{"@id":"https:\/\/www.rosehosting.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rosehosting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.rosehosting.com\/blog\/#organization","name":"RoseHosting","url":"https:\/\/www.rosehosting.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rosehosting.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2022\/03\/android-chrome-192x192-1.png","contentUrl":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2022\/03\/android-chrome-192x192-1.png","width":192,"height":192,"caption":"RoseHosting"},"image":{"@id":"https:\/\/www.rosehosting.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RoseHosting","https:\/\/x.com\/rosehosting","https:\/\/www.linkedin.com\/in\/rosehosting\/"],"description":"RoseHosting is a leading Linux hosting provider, serving thousands of clients world-wide since 2001.","email":"info@rosehosting.com","telephone":"(314) 275-0414","legalName":"Rose Web Services LLC","foundingDate":"2001-04-02","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"}},{"@type":"Person","@id":"https:\/\/www.rosehosting.com\/blog\/#\/schema\/person\/7ce77a842fa6a9a7f8efa186f2353713","name":"Jeff Wilson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0985fed6af04cc60703d2ecf27c65dfa373e0ca00eb21c0b03477e099ea3f99f?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0985fed6af04cc60703d2ecf27c65dfa373e0ca00eb21c0b03477e099ea3f99f?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0985fed6af04cc60703d2ecf27c65dfa373e0ca00eb21c0b03477e099ea3f99f?s=96&r=g","caption":"Jeff Wilson"},"description":"An experienced Linux veteran with many years of experience. Helping other Linux admins with frequent Linux and business-related blog posts on the RoseHosting blog. Techie by choice. Loving nature and travel. Happily married and father of two lovely children.","sameAs":["https:\/\/www.rosehosting.com","https:\/\/www.facebook.com\/rosehosting.helpdesk"],"url":"https:\/\/www.rosehosting.com\/blog\/author\/jwilson\/"}]}},"_links":{"self":[{"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/posts\/29935","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/comments?post=29935"}],"version-history":[{"count":3,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/posts\/29935\/revisions"}],"predecessor-version":[{"id":44286,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/posts\/29935\/revisions\/44286"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/media\/29937"}],"wp:attachment":[{"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/media?parent=29935"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/categories?post=29935"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/tags?post=29935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}