{"id":2449,"date":"2018-09-10T19:52:22","date_gmt":"2018-09-10T14:22:22","guid":{"rendered":"https:\/\/blog.pheonixsolutions.com\/?p=2449"},"modified":"2018-10-12T16:07:02","modified_gmt":"2018-10-12T10:37:02","slug":"how-to-configure-ssh-key-access-to-linux-server-using-windows-client","status":"publish","type":"post","link":"https:\/\/pheonixsolutions.com\/blog\/how-to-configure-ssh-key-access-to-linux-server-using-windows-client\/","title":{"rendered":"How to configure SSH Key access to Linux Server using Windows (client)?"},"content":{"rendered":"<h3><strong>How to configure SSH Key access to Linux Server using Windows (client)?<\/strong><\/h3>\n<p>Posted Date : 07-09-2018<\/p>\n<p>In this article, We&#8217;ll be explaining how to provide SSH Key authentication to the Windows User(Client) to use Linux server without using password.<\/p>\n<p><strong>Prerequisites:<\/strong><\/p>\n<p>1.Install Open SSH in Linux Machine<\/p>\n<p>2.Install PuTTY in Windows Machine<\/p>\n<p style=\"text-align: justify;\">3.Install PuTTYGen in windows to generate SSH Keys<\/p>\n<p style=\"text-align: justify;\"><strong>Note :<\/strong> We demonstrate this task with assumption that our\u00a0Linux Server running in CentOS 7 Distribution and Windows client running in Windows 10 (its applicable for other version also).Moreover, it will be same for other Linux Server distribution Ubuntu\/Debian.<\/p>\n<p style=\"text-align: justify;\">SSH key is a Secure shell Key, it is an access credential SSH protocol to communicate with servers. There are few different ways to login to server. Let\u2019s see about one of the predominant way to login. It\u2019s an extremely secure way to login to the server.<\/p>\n<h4><strong>How SSH Key works (RSA Algorithm for Cryptography)?<\/strong><\/h4>\n<p style=\"text-align: justify;\">Actually, it follows protocol of RSA algorithm encrypting process using two authentication keys to authenticate client to SSH server. SSH keys are named as Private Key and Public Key. Private Key will kept secret by the Client, at no matter this key shouldn\u2019t be compromised with others, because attackers can easily login to the server without any further authentication. The Public key in the SSH server used to encrypt the message, which can be decrypt only by private key at the client machine.<\/p>\n<p style=\"text-align: justify;\">The public key is uploaded to a remote server by logging to SSH.The key is added to special file within the user account you will be logging into called .ssh\/authorized_keys<\/p>\n<p style=\"text-align: justify;\">When a client attempts to login, the server check for the authentication of the client. If once the client prove their identity using private key, the shell session is spawned and the requested command is executed, else access is denied.<\/p>\n<h4 style=\"text-align: justify;\"><strong>How to generate SSH Key?<\/strong><\/h4>\n<p style=\"text-align: justify;\"><span style=\"margin: 0px; color: #333333; font-family: 'Georgia','serif'; font-size: 12pt;\">Download and Install PuTTYGen. Then generate Private Key and Public Key by following the steps explained in figure 1.<br \/>\nNote : Add Key passphrase. It provide additional protection to your account.<\/span><\/p>\n<p><a href=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/09\/1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2450\" src=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/09\/1.jpg\" alt=\"\" width=\"744\" height=\"489\" srcset=\"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2018\/09\/1.jpg 744w, https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2018\/09\/1-300x197.jpg 300w\" sizes=\"auto, (max-width: 744px) 100vw, 744px\" \/><\/a><\/p>\n<h6 style=\"text-align: center;\">Figure 1 : How to generation of SSH Key using PuTTYGen<\/h6>\n<h6 style=\"text-align: justify;\"><span style=\"margin: 0px; line-height: 107%; font-family: 'Calibri','sans-serif'; font-size: 11pt;\"><b><span style=\"color: #000000;\">How to Load Public key in server?<\/span><\/b><\/span><\/h6>\n<p style=\"text-align: justify;\"><strong>Step 1 :<\/strong> Login to the server using password as user for whom the SSH Key authentication need to be enabled.<\/p>\n<p style=\"text-align: justify;\"><strong>Step 2 :<\/strong> You will be directed to \/home\/user directory.Check for .ssh file\/directory in your current directory by using following commands,<\/p>\n<p><code class=\"EnlighterJSRAW\" data-enlighter-language=\"null\">cd<br \/>\n<\/code><\/p>\n<p><code class=\"EnlighterJSRAW\" data-enlighter-language=\"null\">ls \u2013la | grep .ssh<br \/>\n<\/code><\/p>\n<p><span style=\"color: #000000; font-family: Calibri;\">If you can\u2019t find it , create the directory \/ .ssh<\/span><\/p>\n<p><code class=\"EnlighterJSRAW\" data-enlighter-language=\"null\"> mkdir .ssh<br \/>\n<\/code><\/p>\n<p style=\"text-align: justify;\"><code class=\"EnlighterJSRAW\" data-enlighter-language=\"null\">cd .ssh\/<br \/>\n<\/code><\/p>\n<p style=\"text-align: justify;\"><strong>Step 3: <\/strong>After step 2, you need to upload public key in the server authorized files under .ssh\/authorized_key .In prior copy the Public key from PuTTYGen as shown below in figure 2,<\/p>\n<p><a href=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/09\/2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2451\" src=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/09\/2.jpg\" alt=\"\" width=\"601\" height=\"550\" srcset=\"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2018\/09\/2.jpg 601w, https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2018\/09\/2-300x275.jpg 300w\" sizes=\"auto, (max-width: 601px) 100vw, 601px\" \/><\/a><\/p>\n<h6 style=\"text-align: center;\">Figure 2 : How to Copy Public Key from PuTTYGen<\/h6>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-family: Calibri;\">Now in your user terminal under the path\u00a0 (# Cd .ssh\/),<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\"><span style=\"font-family: Calibri;\">Type :\u00a0<code class=\"EnlighterJSRAW\" data-enlighter-language=\"null\">echo (past the copied public key) &gt;&gt; authorization_keys<\/code><\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000; font-family: Calibri;\">Note:\u00a0 &gt;&gt; ; this help to append the key with the file named authorization keys<\/span><\/p>\n<p style=\"text-align: justify;\"><strong>Step 4<\/strong>: logout the session<\/p>\n<p style=\"text-align: justify;\"><strong>Step 5 :<\/strong> Configure to Linux\/OpenSSH Server with private key using the windows (client machine) path.<\/p>\n<p style=\"text-align: justify;\">Open putty terminal, under authorization and then add private key path shown in figure 3,<\/p>\n<h6><a href=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/09\/SSH.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-2683\" src=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/09\/SSH.jpg\" alt=\"\" width=\"681\" height=\"368\" srcset=\"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2018\/09\/SSH.jpg 681w, https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2018\/09\/SSH-300x162.jpg 300w\" sizes=\"auto, (max-width: 681px) 100vw, 681px\" \/><\/a><\/h6>\n<h6><\/h6>\n<h6><\/h6>\n<h6><\/h6>\n<h6><\/h6>\n<h6><\/h6>\n<h6><\/h6>\n<h6><\/h6>\n<h6><\/h6>\n<h6><\/h6>\n<h6><\/h6>\n<h6><\/h6>\n<h6 style=\"text-align: center;\">Figure 3 : How to add private key path for authentication in PuTTY<\/h6>\n<p style=\"text-align: justify;\"><strong>Step 6 : <\/strong>Now using PuTTY login into the server as shown in figure 4.<\/p>\n<p style=\"text-align: justify;\">Enter login : root\/specified username<\/p>\n<p style=\"text-align: justify;\">then using key access and key passphrase login to the account (its important to note down the key passphrase).<\/p>\n<p><a href=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/09\/4.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2453\" src=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/09\/4.jpg\" alt=\"\" width=\"582\" height=\"126\" srcset=\"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2018\/09\/4.jpg 582w, https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2018\/09\/4-300x65.jpg 300w\" sizes=\"auto, (max-width: 582px) 100vw, 582px\" \/><\/a><\/p>\n<h6 style=\"text-align: center;\">Figure 4 : Logging to server using SSH Key access (Key &amp; Key passphrase)<\/h6>\n<p style=\"text-align: justify;\">Congratulations! Now you have logged into your Linux machine using public\/private key authentication.<\/p>\n<p style=\"text-align: justify;\">Please feel free to provide constructive feedback. Comments are greatly appreciated !<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How to configure SSH Key access to Linux Server using Windows (client)? Posted Date : 07-09-2018 In this article, We&#8217;ll be explaining how to provide SSH Key authentication to the Windows User(Client) to use Linux server without using password. Prerequisites: 1.Install Open SSH in Linux Machine 2.Install PuTTY in Windows&hellip; <a href=\"https:\/\/pheonixsolutions.com\/blog\/how-to-configure-ssh-key-access-to-linux-server-using-windows-client\/\" class=\"more-link read-more\" rel=\"bookmark\">Continue Reading <span class=\"screen-reader-text\">How to configure SSH Key access to Linux Server using Windows (client)?<\/span><i class=\"fa fa-arrow-right\"><\/i><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[225],"tags":[410,411,334,409],"class_list":{"0":"post-2449","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"hentry","6":"category-linux","7":"tag-key-authentication","8":"tag-puttygen","9":"tag-ssh-key","10":"tag-windows-client-remote-access-to-linux-server","11":"h-entry","13":"h-as-article"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Pheonix Solutions - We Empower Your Business Growth<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pheonixsolutions.com\/blog\/how-to-configure-ssh-key-access-to-linux-server-using-windows-client\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pheonix Solutions - We Empower Your Business Growth\" \/>\n<meta property=\"og:description\" content=\"How to configure SSH Key access to Linux Server using Windows (client)? Posted Date : 07-09-2018 In this article, We&#8217;ll be explaining how to provide SSH Key authentication to the Windows User(Client) to use Linux server without using password. Prerequisites: 1.Install Open SSH in Linux Machine 2.Install PuTTY in Windows&hellip; Continue Reading How to configure SSH Key access to Linux Server using Windows (client)?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pheonixsolutions.com\/blog\/how-to-configure-ssh-key-access-to-linux-server-using-windows-client\/\" \/>\n<meta property=\"og:site_name\" content=\"PHEONIXSOLUTIONS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PheonixSolutions-209942982759387\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-10T14:22:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-10-12T10:37:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/09\/1.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pheonixsolution\" \/>\n<meta name=\"twitter:site\" content=\"@pheonixsolution\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-configure-ssh-key-access-to-linux-server-using-windows-client\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-configure-ssh-key-access-to-linux-server-using-windows-client\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#\\\/schema\\\/person\\\/0ffa33d73c869faec2d50e79c24e3503\"},\"headline\":\"How to configure SSH Key access to Linux Server using Windows (client)?\",\"datePublished\":\"2018-09-10T14:22:22+00:00\",\"dateModified\":\"2018-10-12T10:37:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-configure-ssh-key-access-to-linux-server-using-windows-client\\\/\"},\"wordCount\":609,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-configure-ssh-key-access-to-linux-server-using-windows-client\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.pheonixsolutions.com\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/1.jpg\",\"keywords\":[\"Key authentication\",\"PuTTYGen\",\"ssh-key\",\"windows client remote access to Linux server\"],\"articleSection\":[\"Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-configure-ssh-key-access-to-linux-server-using-windows-client\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-configure-ssh-key-access-to-linux-server-using-windows-client\\\/\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-configure-ssh-key-access-to-linux-server-using-windows-client\\\/\",\"name\":\"Pheonix Solutions - We Empower Your Business Growth\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-configure-ssh-key-access-to-linux-server-using-windows-client\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-configure-ssh-key-access-to-linux-server-using-windows-client\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.pheonixsolutions.com\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/1.jpg\",\"datePublished\":\"2018-09-10T14:22:22+00:00\",\"dateModified\":\"2018-10-12T10:37:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-configure-ssh-key-access-to-linux-server-using-windows-client\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-configure-ssh-key-access-to-linux-server-using-windows-client\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-configure-ssh-key-access-to-linux-server-using-windows-client\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.pheonixsolutions.com\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/1.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.pheonixsolutions.com\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/1.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-configure-ssh-key-access-to-linux-server-using-windows-client\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to configure SSH Key access to Linux Server using Windows (client)?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/\",\"name\":\"Pheonix Solutions\",\"description\":\"We Empower Your Business Growth\",\"publisher\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#organization\",\"name\":\"PheonixSolutions\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/logo.png\",\"width\":454,\"height\":300,\"caption\":\"PheonixSolutions\"},\"image\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/PheonixSolutions-209942982759387\\\/\",\"https:\\\/\\\/x.com\\\/pheonixsolution\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#\\\/schema\\\/person\\\/0ffa33d73c869faec2d50e79c24e3503\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\\\/\\\/blog.pheonixsolutions.com\"],\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pheonix Solutions - We Empower Your Business Growth","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pheonixsolutions.com\/blog\/how-to-configure-ssh-key-access-to-linux-server-using-windows-client\/","og_locale":"en_US","og_type":"article","og_title":"Pheonix Solutions - We Empower Your Business Growth","og_description":"How to configure SSH Key access to Linux Server using Windows (client)? Posted Date : 07-09-2018 In this article, We&#8217;ll be explaining how to provide SSH Key authentication to the Windows User(Client) to use Linux server without using password. Prerequisites: 1.Install Open SSH in Linux Machine 2.Install PuTTY in Windows&hellip; Continue Reading How to configure SSH Key access to Linux Server using Windows (client)?","og_url":"https:\/\/pheonixsolutions.com\/blog\/how-to-configure-ssh-key-access-to-linux-server-using-windows-client\/","og_site_name":"PHEONIXSOLUTIONS","article_publisher":"https:\/\/www.facebook.com\/PheonixSolutions-209942982759387\/","article_published_time":"2018-09-10T14:22:22+00:00","article_modified_time":"2018-10-12T10:37:02+00:00","og_image":[{"url":"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/09\/1.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@pheonixsolution","twitter_site":"@pheonixsolution","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-configure-ssh-key-access-to-linux-server-using-windows-client\/#article","isPartOf":{"@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-configure-ssh-key-access-to-linux-server-using-windows-client\/"},"author":{"name":"admin","@id":"https:\/\/pheonixsolutions.com\/blog\/#\/schema\/person\/0ffa33d73c869faec2d50e79c24e3503"},"headline":"How to configure SSH Key access to Linux Server using Windows (client)?","datePublished":"2018-09-10T14:22:22+00:00","dateModified":"2018-10-12T10:37:02+00:00","mainEntityOfPage":{"@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-configure-ssh-key-access-to-linux-server-using-windows-client\/"},"wordCount":609,"commentCount":0,"publisher":{"@id":"https:\/\/pheonixsolutions.com\/blog\/#organization"},"image":{"@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-configure-ssh-key-access-to-linux-server-using-windows-client\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/09\/1.jpg","keywords":["Key authentication","PuTTYGen","ssh-key","windows client remote access to Linux server"],"articleSection":["Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/pheonixsolutions.com\/blog\/how-to-configure-ssh-key-access-to-linux-server-using-windows-client\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-configure-ssh-key-access-to-linux-server-using-windows-client\/","url":"https:\/\/pheonixsolutions.com\/blog\/how-to-configure-ssh-key-access-to-linux-server-using-windows-client\/","name":"Pheonix Solutions - We Empower Your Business Growth","isPartOf":{"@id":"https:\/\/pheonixsolutions.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-configure-ssh-key-access-to-linux-server-using-windows-client\/#primaryimage"},"image":{"@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-configure-ssh-key-access-to-linux-server-using-windows-client\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/09\/1.jpg","datePublished":"2018-09-10T14:22:22+00:00","dateModified":"2018-10-12T10:37:02+00:00","breadcrumb":{"@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-configure-ssh-key-access-to-linux-server-using-windows-client\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pheonixsolutions.com\/blog\/how-to-configure-ssh-key-access-to-linux-server-using-windows-client\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-configure-ssh-key-access-to-linux-server-using-windows-client\/#primaryimage","url":"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/09\/1.jpg","contentUrl":"https:\/\/blog.pheonixsolutions.com\/wp-content\/uploads\/2018\/09\/1.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-configure-ssh-key-access-to-linux-server-using-windows-client\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pheonixsolutions.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to configure SSH Key access to Linux Server using Windows (client)?"}]},{"@type":"WebSite","@id":"https:\/\/pheonixsolutions.com\/blog\/#website","url":"https:\/\/pheonixsolutions.com\/blog\/","name":"Pheonix Solutions","description":"We Empower Your Business Growth","publisher":{"@id":"https:\/\/pheonixsolutions.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pheonixsolutions.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/pheonixsolutions.com\/blog\/#organization","name":"PheonixSolutions","url":"https:\/\/pheonixsolutions.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pheonixsolutions.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2016\/12\/logo.png","contentUrl":"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2016\/12\/logo.png","width":454,"height":300,"caption":"PheonixSolutions"},"image":{"@id":"https:\/\/pheonixsolutions.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PheonixSolutions-209942982759387\/","https:\/\/x.com\/pheonixsolution"]},{"@type":"Person","@id":"https:\/\/pheonixsolutions.com\/blog\/#\/schema\/person\/0ffa33d73c869faec2d50e79c24e3503","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09bacc0294abee1322a23ab4bc6a0330dd4cb4df707dc9d0b0efeba6c109608b?s=96&r=g","caption":"admin"},"sameAs":["http:\/\/blog.pheonixsolutions.com"],"url":"https:\/\/pheonixsolutions.com\/blog\/author\/admin\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p7F4uM-Dv","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/posts\/2449","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/comments?post=2449"}],"version-history":[{"count":0,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/posts\/2449\/revisions"}],"wp:attachment":[{"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/media?parent=2449"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/categories?post=2449"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/tags?post=2449"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}