Skip to content

Authorized Keys

This page stores the user's Public Key for authentication to the 12Port SSH Proxy server.

Native SSH client access supports public key authentication of the application user to the SSH Proxy as an alternative to password authentication.

Public key authentication to SSH Proxy carry the following benefits

  • Increase Security. When using private keys to authenticate, there is no need to transmit passwords over the network. And because the private key is kept on your local machine, it is less vulnerable to interception or attack.
  • Better Access Control. SSH keys can control access to servers and applications by restricting access only to authorized users with the corresponding private key.
  • Convenience. SSH keys can be more convenient and increase users’ productivity. Whilst the recommended practice is to encrypt keys with a unique passphrase.
  • Automation. SSH keys can be used in scripts and automation tools to automate tasks that require logging into a remote server. This can make managing and maintaining servers and applications easier and reduces the risk of a password being exposed.

To learn how to configure this key authentication, please read our SSH Proxy Public Key Authentication page.