Your browser does not allow storing cookies. We recommend enabling them.

PuTTY Public Key Authentication

Public key authentication in PuTTY uses SSH keys stored in .ppk files. Instructions for configuring public key authentiation for PuTTY can be found here.

There have been documented instances of malware collecting PuTTY SSH keys. In the widely publicized Sony breach, attackers went after .ppk files. This illustrates how important SSH key management is. As of this writing, Universal SSH Key Manager is the only SSH key management solution that supports PuTTY keys.




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now