SSH Key Authentication Use SSH key authentication for secure remote access and file transfer

fn_vidyard_48cuDAmsYrRXTiyUjiZiCY();

Require key-based SSH logins for secure file transfer

Require key-based SSH logins for secure file transfer

Serv-U® Managed File Transfer (MFT) offers your end users the options they need for safe file access and transfer. MFT supports the SSH protocol, which enables SSH private key authentication, a proven, enterprise-grade method for enhanced access control and data encryption. Admins can easily assign users SSH key pairs through the Serv-U console, helping ensure only the correct users have access to sensitive data. 
DOWNLOAD FREE TRIAL START FREE TRIAL Fully functional for 14 days
Learn More

Support easy remote sharing with public key authentication

Support easy remote sharing with public key authentication

Serv-U MFT key-based SSH login capabilities provide end users with easy peer-to-peer file sharing and folder synchronization. SSH authentication occurs automatically, and MFT doesn’t require special clients or plugins for users to leverage key-based SSH login. Admins can take advantage of SSH key authentication, password-only, or SSH and password-protected multi-factor authentication to facilitate quick, secure connections for end users seeking to share and receive data. 
DOWNLOAD FREE TRIAL START FREE TRIAL Fully functional for 14 days
Learn More

Use SSH private key authentication to demonstrate compliance

Use SSH private key authentication to demonstrate compliance

While managing user access and file sharing, admins must remain aware of any and all regulations governing their operations, including the likes of PCI DSS, HIPAA, FISMA, and SOX. In many cases, admins need capabilities like SSH private key authentication to ensure sufficiently high standards for file encryption and transfer. Admins can easily control the terms of file transfers by automating Serv-U functions like SSH key provisioning through a centralized, web-based console. Admins can also integrate Serv-U with Active Directory to streamline user account management.
DOWNLOAD FREE TRIAL START FREE TRIAL Fully functional for 14 days
Learn More
Get More on SSH Key Authentication
Do you find yourself asking…
  • What is SSH key authentication?
  • How secure is SSH key authentication?
  • How does SSH public key authentication work?
  • How do I set up public key authentication in Serv-U?
  • What is SSH key authentication?

    Secure Shell (SSH) key authentication is a form of remote access control commonly used in file transfer tools and often leveraged by major corporations and cloud data centers. The SSH protocol provides secure remote login, and key authentication is based on the generation of SSH keys, which are encrypted access credentials. A common form of key authentication is public key authentication, which allows access between a local machine and a remote server.

    While it’s possible to use a traditional username and password with the SSH protocol, it’s more common to leverage key authentication in which a local client machine and a remote machine authenticate using pairs of unique SSH keys. The client machine holds the private key to “unlock” the public key held on the remote machine, allowing the user on the client machine to automatically initiate a secure remote connection.

  • How secure is SSH key authentication?

    SSH key authentication is typically more secure than relying on traditional usernames and passwords. User-made passwords are often too weak or not changed regularly enough, but SSH authentication is designed to offer an improved, automated, and more secure login method using encryption. For example, unlike traditional letter and number passwords, a private SSH key will be at least 1024 bits long, with highly secure SSH keys stretching up to 4096 bits.

    While built to be secure, SSH keys may still require admin management to enforce this security. Admins need to be able to provision, deprovision, and configure SSH keys for users across a network to ensure only the correct users have access to sensitive data. For additional security, SSH authentication can be used in conjunction with a password for multi-factor authentication.

  • How does SSH public key authentication work?

    SSH public key authentication works by establishing a key pair to give specific users access to protected data. SSH key authentication is built to limit remote access logins to the computer with the private key. The computer generates the cryptographic key pair, which includes a public key and a private key. The public key exists on the SSH server, and anyone with a copy of this public key can use it to encrypt data so only the person with the private key can decrypt and read the data. The private key remains with the user on their local machine and corresponds to the public key, allowing the server to authenticate and send the encrypted data to the local device.

  • How do I set up public key authentication in Serv-U?

    Admins can configure Serv-U to enable users to leverage public key authentication. Here are some key functions for enabling SFTP and public key authentication within Serv-U.

    Configure Serv-U for public key authentication:

    • Within the Serv-U management console, select the user account to use a private key to authenticate.
    • Click Manage Keys within the User Information tab.
    • Generate a key within Serv-U with Create Key or Add Key to add one from a third-party generator.
    • In the Limits & Settings tab, select the password type.
    • Set SSH Authentication Type to Public Key Only.
    • Alternatively, admins can require users to authenticate with both a password and key by setting the SSH Authentication Type to Password and Public Key. 

    Use an existing private key:

    • Use a command tool or third-party tool to generate the .key private key file.

    • Place this private key in a secured directly on the server.
    • Within Serv-U, use the Browse button to find and select this file. 
    • Enter the password required to access the .key file, then click Save.

    Create a private key within Serv-U:

    • Click the Create Private Key button within the Serv-U dashboard.
    • Enter a name for the private key and a corresponding output path for the certificate.
    • Select the key type. While the RSA format is available, DSA is the preferred format. 
    • Select the key length. The default is 1024 bits, which provides the best performance. However, 4096 bits provides the best security, and 2048 bits supports a mix of good performance and security.
    • Enter a password to secure the private key file.

What is SSH key authentication?

Secure Shell (SSH) key authentication is a form of remote access control commonly used in file transfer tools and often leveraged by major corporations and cloud data centers. The SSH protocol provides secure remote login, and key authentication is based on the generation of SSH keys, which are encrypted access credentials. A common form of key authentication is public key authentication, which allows access between a local machine and a remote server.

While it’s possible to use a traditional username and password with the SSH protocol, it’s more common to leverage key authentication in which a local client machine and a remote machine authenticate using pairs of unique SSH keys. The client machine holds the private key to “unlock” the public key held on the remote machine, allowing the user on the client machine to automatically initiate a secure remote connection.

Close
How secure is SSH key authentication?

SSH key authentication is typically more secure than relying on traditional usernames and passwords. User-made passwords are often too weak or not changed regularly enough, but SSH authentication is designed to offer an improved, automated, and more secure login method using encryption. For example, unlike traditional letter and number passwords, a private SSH key will be at least 1024 bits long, with highly secure SSH keys stretching up to 4096 bits.

While built to be secure, SSH keys may still require admin management to enforce this security. Admins need to be able to provision, deprovision, and configure SSH keys for users across a network to ensure only the correct users have access to sensitive data. For additional security, SSH authentication can be used in conjunction with a password for multi-factor authentication.

Close
How does SSH public key authentication work?

SSH public key authentication works by establishing a key pair to give specific users access to protected data. SSH key authentication is built to limit remote access logins to the computer with the private key. The computer generates the cryptographic key pair, which includes a public key and a private key. The public key exists on the SSH server, and anyone with a copy of this public key can use it to encrypt data so only the person with the private key can decrypt and read the data. The private key remains with the user on their local machine and corresponds to the public key, allowing the server to authenticate and send the encrypted data to the local device.
Close

Serv-U supports SSH key authentication for secure encryption

Serv-U

  • Admins can require SSH key authentication to ensure enterprise-grade data encryption.

  • The Serv-U console allows users and admins to easily create public and private key pairs

  • Key-based SSH login enables automatic, fast, and secure file transfer.

DOWNLOAD FREE TRIAL Fully functional for 14 days
Learn More
Let’s talk it over.
Contact our team. Anytime.
+1-866-530-8100
{{STATIC CONTENT}}
{{CAPTION_TITLE}}

{{CAPTION_CONTENT}}

{{TITLE}}