Managing SSH key-based access for virtual system instances

You can add Secure Shell (SSH) key-based access to a virtual machine during virtual system pattern deployment, or add it to a virtual system instance after deployment. This type of security provides better protection than password-based access.

About this task

To access deployed virtual machines for troubleshooting and maintenance purposes, you must set up SSH key-based access with an RSA key pair. The key has user ID "virtuser".

You can either provide your own externally generated public key or use a key pair that is generated by the system. After you generate the key pair, you can install the public key during virtual system pattern deployment and give the private key to users who are allowed to access the virtual machines for debugging and maintenance.

Important: Store a copy of your SSH private key file in a secure location.

After you generate the public and private keys, you can either upload the key to virtual machines when you deploy a virtual system pattern or you can upload the public key to virtual machines in an existing deployed virtual system instance.