Securing SSH Keys
An SSH key enables identification between an SFTP client and SFTP server with public key authentication. Use SSH keys to further secure communications in SFTP exchanges.
Because the SSH File Transfer Protocol (SFTP) uses SSH to secure a network connection for transfers, SFTP takes advantage of the security capabilities of Secure Shell (SSH). SSH uses public-key cryptography for authentication. Like standard public-key cryptography, the SSH private and public keys are generated from a key generator. B2B Advanced Communications accepts public keys that are generated with OpenSSH, or are in valid OpenSSH format. You can use a combination of SSH public key authentication and password authentication to authenticate a user's credentials. With SSH public key authentication, you can authenticate without traditional password authentication, which is both convenient and eliminates the risk of your password ever being intercepted. Public key authentication across SSH uses a private key and a public key to secure a network connection between a client and a server:
You can easily manage your trading partners' public keys, host key pairs, and known host keys in B2B Advanced Communications. On the SSH Keys collection page, you can see all uploaded SSH keys by alias, algorithm and key type.