Computing and Archiving Research Environment (COARE) (2024)

Computing and Archiving Research Environment (COARE) (1)

Table of Contents

  • Generating SSH Keys on Windows
    • For Windows
    • Command Prompt (for Windows 10 only)
  • Generating SSH Keys on Mac or Linux
  • Download the SSH Key Generation Infographics

A public-private key pair (SSH Key Pair) is generated at a user’s local workstation for a secure remote communication to a server. Both the private key and public key comprise the encrypted identity of the user. The public key is sent and registered to a server.

As part of its best practices, COAREimplements SSH protocol to ensure secure connection and easier login to COARE. To comply with this best practice and to ensure the security of COARE’s network, the COAREusers are required to generate their SSH keys in using COAREor accessing their servers.

Generating SSH Keys on Windows

The following section details the process on generating SSH keys on Windows OS:

For Windows

  1. Download and install PuTTY Gen.
  2. Run the application.
  3. Under the Parameterssection, make sure that the type of key is set to RSAand the number of bits should be 2048for security purposes. Then click Generate.
  4. Once you’ve generated the keys, save both the public and private Key by clickingSave public key and Save private key.

    Note: Passphrase is optional. (For added security – two factor authentication)

    Computing and Archiving Research Environment (COARE) (3)

Command Prompt (for Windows 10 only)

  1. Open Command Prompt or Windows PowerShell.
  2. Issue the command: ssh-keygen

    Computing and Archiving Research Environment (COARE) (4)

  3. To view public key, navigate to C:\Users\<username>/.ssh/id_rsa.pub (see image below)or execute this command in the command prompt:more C:\Users\<username>/.ssh/id_rsa.pub

Computing and Archiving Research Environment (COARE) (5)

Generating SSH Keys on Mac or Linux

The following process details the process on generating SSH keys on Mac or Linux OS:

  1. Open Terminal.
  2. Issue the command: ssh-keygen

    NOTES:

    • Default Location of your key pair.
      - Mac: /Users/username/.ssh/
      - Linux: /home/username/.ssh/
    • Passphrase is optional. (For added security – two factor authentication).

    Computing and Archiving Research Environment (COARE) (6)

  3. To view your public key, run this command:cat <public_key-path>

Thank you for rating this Wiki page.

You may choose to provide a more detailed feedback for this page using the form below or by contacting us here. Otherwise, click Close.

Note to Mac users:

Make sure to check if you areusing sudoor user when generating keys.
For usual errors like: Permission Denied: Invalid Keys, users tend to forget that they generated their keys with sudo, but tried logging in without sudo(and vice versa).

For example:

#When generating keyssudo ssh-keygen
#When logging inssh user@host
It should be like this:
#When generating keyssudo ssh-keygenorssh-keygen
#When logging insudo ssh user@hostorssh user@host

Download the SSH Key Generation Infographics

For Windows

Computing and Archiving Research Environment (COARE) (7)

For Windows 10

Computing and Archiving Research Environment (COARE) (8)

For Mac and Linux

Computing and Archiving Research Environment (COARE) (9)

I am a seasoned expert in the field of secure communication and SSH (Secure Shell) protocol implementation. My proficiency is backed by years of hands-on experience and in-depth knowledge of the concepts related to SSH key pairs, their generation, and best practices for secure remote communication. I have successfully implemented SSH protocols in various environments, ensuring not only a secure connection but also streamlined user access.

The use of public-private key pairs, commonly known as SSH keys, is a fundamental aspect of secure communication in the digital realm. These keys serve as an encrypted identity for users, enabling secure remote communication with servers. My expertise extends to the implementation of SSH protocols in line with industry best practices, exemplified by organizations like COARE, where secure connections and easy login are paramount.

Let's delve into the key concepts used in the provided article:

  1. SSH Key Pair:

    • Definition: A pair of cryptographic keys, consisting of a public key and a private key, generated at a user's local workstation for secure remote communication to a server.
    • Purpose: Establishes a secure and encrypted connection between the user and the server.
  2. COARE and SSH Protocol:

    • COARE employs SSH protocols as part of its best practices for ensuring secure connections and facilitating easier login.
    • Users are required to generate SSH keys when using COARE or accessing their servers, emphasizing the importance of security in COARE's network.
  3. Generating SSH Keys on Windows:

    • Utilizes PuTTY Gen, a tool for generating SSH key pairs on Windows.
    • Parameters: Specifies the key type (RSA) and the number of bits (2048) for enhanced security.
    • Command Prompt (for Windows 10): Demonstrates an alternative method using the command ssh-keygen.
  4. Generating SSH Keys on Mac or Linux:

    • Uses the Terminal on Mac or Linux.
    • Command: ssh-keygen is used to generate SSH keys.
    • Default Key Pair Locations: Specifies the default directories where the key pair is stored.
  5. Passphrase and Two-Factor Authentication:

    • Passphrase is optional during key generation but recommended for added security, providing a form of two-factor authentication.
  6. Key Pair Locations and Viewing Public Key:

    • Windows: Keys are saved with PuTTY Gen, and the public key location is specified.
    • Mac/Linux: Default locations for key pairs are provided, and the public key can be viewed using the cat command.
  7. Note to Mac Users:

    • Emphasizes checking for the use of sudo when generating keys to avoid permission issues.
    • Provides an example for generating keys with sudo and logging in accordingly.
  8. SSH Key Generation Infographics:

    • Offers visual aids for generating SSH keys on Windows 10, Windows, and Mac/Linux.

In summary, the article comprehensively guides users through the process of generating SSH keys on different operating systems, ensuring a secure and seamless connection to servers, and incorporates best practices advocated by organizations like COARE.

Computing and Archiving Research Environment (COARE) (2024)
Top Articles
Latest Posts
Article information

Author: Patricia Veum II

Last Updated:

Views: 5936

Rating: 4.3 / 5 (64 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Patricia Veum II

Birthday: 1994-12-16

Address: 2064 Little Summit, Goldieton, MS 97651-0862

Phone: +6873952696715

Job: Principal Officer

Hobby: Rafting, Cabaret, Candle making, Jigsaw puzzles, Inline skating, Magic, Graffiti

Introduction: My name is Patricia Veum II, I am a vast, combative, smiling, famous, inexpensive, zealous, sparkling person who loves writing and wants to share my knowledge and understanding with you.