Ben Trumbore
Cornell Center for Advanced Computing

Revisions: 6/2023, 11/2018, 5/2018, 1/2018 (original)

Acknowledgments: Material from Indiana University's Pervasive Technology Institute was adapted for inclusion in this topic.

Cloud computing environments use Secure Shell (SSH) Keys to provide secure access to cloud instances. This topic explains what SSH Keys are, discusses how to create them, and describes how they can be uploaded to Jetstream2 for use in your work.

Objectives

After you complete this segment, you should be able to:

  • Describe what SSH keys are and how they are used in cloud computing.
  • Create an SSH key pair on the operating system of your choice.
  • Upload an SSH key pair to Jetstream2 for use in your work.
Prerequisites
 
©   Cornell University  |  Center for Advanced Computing  |  Copyright Statement  |  Inclusivity Statement