Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Stronger security: SSH keys are far more resistant to brute‑force attacks than passwords.
  • Password‑less authentication: Once configured, you can log in without typing a password, improving both security and usability.
  • Consistent access across services: Many EWC services rely on SSH keys to grant access to virtual machines, Kubernetes nodes, or infrastructure components.
  • User‑controlled credentials: You generate and manage your own keys, giving you full control over your access.

3. How to Create SSH Keys

You will need to create a key pair if you don't have an existing key pair already.  If you do, then see below.

From a Linux or Mac, you may generate it with the command (follow the instructions it prompts you with):

No Format
ssh-keygen -m pem -t rsa

This creates a key pair in "PEM" format, but other formats exist, please check: What is ssh-keygen & How to Use It to Generate a New SSH Key?


To use the keys for passwordless login, please look at one of the many guides on the Internet for your ssh client (examples below) but note you may need to transform key format in some cases.

4. Where SSH Keys Are Used in the EWC

SSH keys are required or recommended in several EWC services. Each service has its own procedure for registering or uploading your public key.

...