CONFIGURE SFTP – SSH RSA AUTHENTICATION
We will need to use SecureCRT to generate the RSA Private & Public keys. Private keys are
imported into client SFTP software for the connecting host and the Public key is imported
into the SFTP user directory on the FTP Server. You can also copy the Public Key directly into
the FTP server directory into the FTP user account. This will overall bind the FTP user to use
the RSA SSH Public key.
Generate and create Private & Public key using SecureCRT :
Use SecureCRT to create an RSA Private & Public key.
You will have the choice of storing your public key in a file that matches the IETF standard format) or in the OpenSSH format. If you are connecting to an OpenSSH server, you may want to use the OpenSSH format to simplify the process involved with setting up the remote server with your public-key file. If you are connecting to a VShell server, you can use either format since VShell accepts them both. The format (Vandyke does not work with VShell and it has been tried and test. OpenSSH works well.
Public– and Private-key files are placed in a local folder on the machine where the client application resides, usually with the filename “Identity“.
Using Filezilla Client to import the generated and save Private Key :
1. Goto file File, Click on “Site Manager”
2. Click on “New Site”
3. Fill these details :
Host : 192.168.0.1
Protocol : SFTP – SSH File Transfer Protocol
Logon Type : Key file
User : ftpuser
Key file : C:/Users/c_salmana\Documents\Identity
4. Click “OK” to save new site created.
Server SFTP – VShell :
Configuring VShell Server to Recognize Your Public-Key File :
In order to use your public key you must transfer the public-key file created by the Key Generation
wizard to the individual user’s folder under the Publickey folder on the SSH2 server.
For example:
C:\Program files\VShell\Publickey\%User%\Identity.pub