Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document>>
    Installing SSH Tectia Client >>
    Getting Started >>
        Connecting to a Remote Host
        Defining Quick Connect Options
        Generating Keys >>
        Enrolling Certificates >>
        Uploading Your Public Key >>
            Manually Copying the Key File
            Manually Editing the Authorization File
        Using Public-Key Authentication with SSH Accession Lite >>
        Examples of Use
    Configuring SSH Tectia Client >>
    Connecting to a Remote Host Computer>>
    Transferring Files>>
    Tunneling Applications>>
    GUI Reference>>
    Troubleshooting >>
    Command-Line Tools >>

Manually Copying the Key File

The easiest way to manually copy your public key file is the following:

  1. Open the Profile Settings page of the Settings dialog, or select Edit -> Settings, and click Open... next to the User Settings Folder field. The folder containing your user settings is opened. The folder contains a subfolder called UserKeys.
  2. Double-click the UserKeys folder to open it. The folder containing your user keys is opened. Select the file that contains the public key that you want to copy to the remote host computer. Note that the public key has the file extension .pub. Be careful to you copy the file with the .pub extension, and not a similarly named file without a file extension (which would be your private key that you have to keep secure)!
  3. Copy the file to the Windows clipboard by pressing Control+C on the keyboard, or by clicking the file icon with the right mouse button and selecting Copy from the shortcut menu.
  4. Now connect to the remote host server and open a file transfer window, as described in Section File Transfer Window. Your home directory should contain a subdirectory named .ssh2. If you do not see the .ssh2 directory, check that you have the Show Hidden Files option selected on the View menu.
  5. Enter the .ssh2 directory and copy the key file there from the clipboard: press Control+V on the keyboard, or click the right mouse button and select Paste from the shortcut menu.

PreviousNextUp[Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice


 

 
Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more