SSH

SSH (Secure Shell Protocol) is a method to secure remote logins and communications from one computer to another which provides strong authentication and protects communication through strong encryption.

Because SSH provides encrypted messages between two networks, SSH is helpful for security on untrusted networks.

The protocol provides:

  • Secure access for networks
  • File transfers
  • Remote commands
  • Network management

Droplets

To improve your security, we recommend using SSH keys with SFTP. If you aren’t already using SSH keys to connect to your Droplet, set them up using our guide, How-to Add SSH Keys to New or Existing Droplets.

For security reasons, you can’t add or modify the SSH keys on your Droplet using the control panel after you create it, but you have several options to add and modify them via the command line. To learn more about using SSH public keys with existing Droplets, see How to Upload an SSH Public Key to an Existing Droplet.

Firewalls

The suggested inbound rule for SSH allows SSH connections on port 22 so that users can log in to and manage the server from anywhere using a terminal.

SSH Articles

Use Machines to run ML in a Box, a generic data science stack for machine learning (ML) that includes stable and up-to-date installations of widely used ML and mathematics software.
Connect to your compute machines with SSH.
Connect to your compute machines with a password.