Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document>>
    Installing SSH Tectia Client >>
    Getting Started >>
        Connecting to a Remote Host
        Defining Quick Connect Options
        Generating Keys >>
            Key Generation Wizard
            Key Generation - Start
            Key Generation - Key Properties
            Key Generation - Generation
            Key Generation - Enter Passphrase
            Key Generation - Finish
        Enrolling Certificates >>
        Uploading Your Public Key >>
        Using Public-Key Authentication with SSH Accession Lite >>
        Examples of Use
    Configuring SSH Tectia Client >>
    Connecting to a Remote Host Computer>>
    Transferring Files>>
    Tunneling Applications>>
    GUI Reference>>
    Troubleshooting >>
    Command-Line Tools >>

Key Generation - Enter Passphrase

On the Key Generation - Enter Passphrase page you can provide information describing the generated key pair, and protect the files with a passphrase.

Figure : Entering a passphrase for a newly generated key pair

  • File Name

    Type a name for the key file in the File Name field.

  • Comment

    In this field you can write a short comment that describes the key pair. You can for example describe the connection the files are used for. This field is not obligatory, but can be quite useful.

  • Passphrase

    Type a phrase that you have to enter when handling the key. This passphrase works in a similar way to a password and gives some protection for your private key.

    Make the passphrase difficult to guess. Use at least 8 characters, both letters and numbers. Any punctuation characters can be used as well.

    Memorize the passphrase carefully, and do not write it down.

  • Passphrase

    Type the passphrase again. This ensures that you have not made a typing error.

When you have typed the file name and typed the passphrase twice, you can click Next to proceed to the next phase.

PreviousNextUp[Contents] [Index]

[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now