A key pair, composed of a public key and a private key, serves as a crucial set of security credentials used to authenticate your identity when connecting to a Greennode bare-metal. Greennode securely stores the public key on your instance, while you retain control of the private key. For Linux instances, the private key enables a secure SSH connection to your instance. Alternatively, you can leverage Greennode's integrated Systems Manager Session Manager for an interactive, one-click, browser-based shell. The private key, in the possession of anyone, grants access to your instances. Therefore, it is imperative to safeguard your private key in a secure location.
During instance launch, you have the option to specify a key pair. If SSH connectivity is essential, a key pair must be specified. You can either select an existing key pair or generate a new one. Depending on your security strategy, you may use the same key pair across all instances or assign different key pairs. Upon the initial boot, the specified public key is placed in your Linux instance under ~/.ssh/authorized_keys. When connecting via SSH, you must provide the corresponding private key for authentication. Refer to the Connect to your Linux instance documentation for detailed connection instructions. For insights into key pairs and Windows instances, consult the Greennode Key Pairs and Windows Instances documentation.
It's vital to note that Greennode does not retain a copy of your private key, making recovery impossible in the event of loss. However, alternative methods exist for connecting to instances in the scenario of a lost private key. Greennode facilitates the creation of key pairs, allowing you to generate them directly within the platform. Alternatively, you can employ third-party tools to create key pairs and subsequently import the public keys to Greennode