SSH Keys
Ben Trumbore
Cornell Center for Advanced Computing
Revisions: 6/2023, 11/2018, 5/2018, 1/2018 (original)
Acknowledgments: Material from Indiana University's Pervasive Technology Institute was adapted for inclusion in this topic.
Cloud computing environments use Secure Shell (SSH) Keys to provide secure access to cloud instances. This topic explains what SSH Keys are, discusses how to create them, and describes how they can be uploaded to Jetstream2 for use in your work.
Objectives
After you complete this segment, you should be able to:
- Describe what SSH keys are and how they are used in cloud computing.
- Create an SSH key pair on the operating system of your choice.
- Upload an SSH key pair to Jetstream2 for use in your work.
Prerequisites
- Complete the Jetstream2 Overview segment of this roadmap.