{"id":108274,"date":"2024-04-05T09:41:33","date_gmt":"2024-04-05T13:41:33","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=support&p=108274"},"modified":"2024-04-05T09:41:34","modified_gmt":"2024-04-05T13:41:34","slug":"get-started-ssh-and-ssh-keys","status":"publish","type":"support","link":"https:\/\/jumpcloud.com\/support\/get-started-ssh-and-ssh-keys","title":{"rendered":"Get Started: SSH and SSH Keys"},"content":{"rendered":"\n
SSH (Secure Shell) is a protocol used to establish a secure, encrypted connection between two remote devices. This is achieved using SSH keys. SSH keys are an access credential in the SSH protocol. See our blog post, What are SSH Keys?<\/a> to learn more. While SSH keys are standard and more frequently used in Unix and Linux environments, they are also used on Windows devices.<\/p>\n\n\n\n Some benefits of using SSH Keys over passwords are:<\/p>\n\n\n\n SSH keys consist of a pair of cryptographic keys having one private key and one public key. Who or what possesses these keys determines the type of SSH key pair. There are three different types of SSH keys: User keys, Host keys, and Session keys.<\/p>\n\n\n\n See these resources from SSH Academy to learn more: <\/p>\n\n\n\nWhy Use SSH Keys<\/h2>\n\n\n\n
\n
How It Works<\/h2>\n\n\n\n
\n
Best Practices<\/h2>\n\n\n\n
\n