Skip to main content
All CollectionsWebsite ManagementToolsFile Access
How to use SSH to Securely Connect to Your Rapyd Server
How to use SSH to Securely Connect to Your Rapyd Server
Rapyd Team avatar
Written by Rapyd Team
Updated over a month ago

SSH (Secure Shell) is an essential tool for securely managing cloud-hosted environments. Whether you're deploying web applications, managing site configurations, or transferring files, SSH ensures encrypted communication between your local machine and your Rapyd server. In this guide, we'll walk you through how to use SSH, helping you maintain control over your site while ensuring the highest level of security. By the end, you'll be ready to use SSH for seamless and secure access to your cloud environment.

At Rapyd, a key pair is required to connect via SSH. You can upload your own public key if you already have one, or, to simplify the process, you can easily generate a key pair directly from our dashboard. To do this, check the following steps.

Generating a Key Pair for SSH & SFTP

  1. Select a Site on the Rapyd Dashboard

  2. Navigate to Tools > File Access

  3. Go to the SFTP & SSH tab

  4. Click the Create key pair button

  5. Provide a name for your key pair

  6. After creating the key pair, you should see it listed in the dashboard

The key pair consists of two files: one is stored on the server (public key), and another one stored on your computer (private key). This adds an extra layer of security since only devices with the corresponding private key can authenticate.

If you would like to upload an existing public key instead of generating a new one, check the following steps on how to import an existing public key. Otherwise, scroll down to Connecting Using SSH.

Importing an Existing Public Key

  1. Navigate to Tools > File Access in the Rapyd Dashboard

  2. Go to the SFTP & SSH tab. You will also find your SFTP and SSH login credentials here.

  3. Click on the Import key pair button. Enter a Key Pair Name (this can be the same as the name of the file being uploaded)

  4. We recommend uploading the public key file to prevent formatting issues. Select Upload file, choose the public key from your computer (e.g., id_rsa.pub), and click Import Key

  5. If you prefer to paste the content of the public key, select Paste contents

  6. After uploading the key, you should see it listed in the dashboard

    You are now ready to connect to your Rapyd server using SSH. To do so, follow the next steps:

Connecting Using SSH

  1. In macOS and Linux, open the Terminal utility. For Windows, you will need to open Windows PowerShell. All these console utilities include the standard tool OpenSSH which we will use to establish a secure and encrypted connection between your computer and your Rapyd server.

  2. You will need to use the following syntax to properly open a connection using SSH:

    ssh -i '/path/to/public/key' -p 3022 -l user gate.inf.rapydapps.cloud

    • -i: This indicates the location of your public key file. The easiest way to quickly insert the full path is by dragging the file itself and dropping it into the console utility, ensuring it is enclosed in single quotation marks.

    • -p: Port number (usually 3022). We don't use the standard port 22

    • -l: Login username (available in Tools > File Access > SFTP & SSH.)

    • gate.inf.rapydapps.cloud: This is the usual host we provide for allowing SSH and SFTP connections. Ensure it matches what you have in Tools > File Access > SFTP & SSH.

      Please ensure you replace /path/to/your/public/key with the actual path on your computer.

  3. After ensuring all the details are correct, press Enter and type 'Yes' if prompted. You will see something like once the connection has been established:

Conclusion

In this article, we covered the basics of connecting to your Rapyd server using SSH across macOS, Linux, and Windows. By utilizing the OpenSSH tool and following the provided syntax, you can establish a secure connection easily.

Remember to replace the placeholder path with the actual location of your public key file, and use the correct login username and host details. With these steps, you can confidently manage your server securely.

Did this answer your question?