Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document>>
    Installing SSH Tectia Client >>
    Getting Started >>
        Connecting to a Remote Host
        Defining Quick Connect Options
        Generating Keys >>
        Enrolling Certificates >>
        Uploading Your Public Key >>
            Manually Copying the Key File
            Manually Editing the Authorization File
        Using Public-Key Authentication with SSH Accession Lite >>
        Examples of Use
    Configuring SSH Tectia Client >>
    Connecting to a Remote Host Computer>>
    Transferring Files>>
    Tunneling Applications>>
    GUI Reference>>
    Troubleshooting >>
    Command-Line Tools >>

Manually Copying the Key File

The easiest way to manually copy your public key file is the following:

  1. Open the Profile Settings page of the Settings dialog, or select Edit -> Settings, and click Open... next to the User Settings Folder field. The folder containing your user settings is opened. The folder contains a subfolder called UserKeys.
  2. Double-click the UserKeys folder to open it. The folder containing your user keys is opened. Select the file that contains the public key that you want to copy to the remote host computer. Note that the public key has the file extension .pub. Be careful to you copy the file with the .pub extension, and not a similarly named file without a file extension (which would be your private key that you have to keep secure)!
  3. Copy the file to the Windows clipboard by pressing Control+C on the keyboard, or by clicking the file icon with the right mouse button and selecting Copy from the shortcut menu.
  4. Now connect to the remote host server and open a file transfer window, as described in Section File Transfer Window. Your home directory should contain a subdirectory named .ssh2. If you do not see the .ssh2 directory, check that you have the Show Hidden Files option selected on the View menu.
  5. Enter the .ssh2 directory and copy the key file there from the clipboard: press Control+V on the keyboard, or click the right mouse button and select Paste from the shortcut menu.

PreviousNextUp[Contents] [Index]

[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now