What are SSH Keys?
SSH (Secure Shell) keys are a robust and secure way to log into your Strettch Cloud compute instances without typing a password. They work using a cryptographic key pair consisting of two interacting parts:- The Public Key: Think of this as a padlock. You upload this to Strettch Cloud, and we install it on your compute instances. It is perfectly safe to share.
- The Private Key: Think of this as the physical key that opens the padlock. This stays securely on your personal computer and should never be shared with anyone.
- Enhanced Security: Traditional passwords can be guessed, stolen, or cracked using automated “brute-force” attacks. SSH keys use complex cryptographic algorithms that make them virtually impossible to decipher by brute force.
- Convenience: Once set up, you no longer need to remember or type a long, complex password every time you log into your server. The authentication happens instantly in the background.
Generating an SSH Key
If you don’t already have an SSH key, follow the instructions below to generate one on Linux, MacOS & Windows:Windows Users: The commands below can be securely executed natively in modern Windows via PowerShell or Windows Terminal.
Generate a new SSH Key
Open your terminal and run:Then press Enter to accept the default file location. Add a passphrase for extra security. It’s optional but highly recommended.
Adding SSH Keys to Your Team
In Strettch Cloud, SSH keys are managed at the team level. Adding an SSH key to your team settings makes it available to select whenever a team member creates a new compute instance.Add a New Key
Click on Add SSH Key. You will be prompted to paste your Public Key and give it a recognizable name. Since SSH keys are shared at the team level, we recommend using a
Firstname@Computer format (e.g., Sam@MacBookPro).Using SSH Keys During Compute Creation
Once you have added at least one SSH key to your team, it becomes highly recommended to apply it when provisioning a new Compute instance. This replaces the default insecure password authentication method.Select SSH Keys
In the Authentication section during compute creation, you will see a list of the SSH keys attached to your team.

