How To Configure SSH Keys Authentication With PuTTY And Linux Server In 5 Quick Steps

This tutorial explains how you can replace password-based SSH authentication with key-based authentication which is more secure because only the people that own the key can log in. In this example, we're using PuTTY as our SSH client on a Windows system.


1. Get the zip file with all PuTTY binaries

2. Generate a private and public key pair

Open PuTTYgen.exe, press Generate button, move mouse. Once the keys are generated, type your key passphrase (choose a "hard to guess" one). Save Public key. Save Private key.

Screen shot: PuTTY key generator

3. Configure your Linux server (create user, save public key)

For this guide let's assume you regular login name is autotimesheet (replace it with one that you use regularly).

As root, on the shell, type:

adduser autotimesheet --disabled-password

You will be asked to fill in some details such as the user's real name (empty string is fine).

Now type:

su autotimesheet
cd /home/autotimesheet
mkdir .ssh
chmod 700 .ssh
cd .ssh

Then in that folder, create and edit a file called authorized_keys2.

In there, cut/paste your public ssh key, on ONE LINE (That is very important!!!)

Do not add the [email protected] at the end of the line.
Do not add the rsa-key-20090614 at the end.
Make sure, there is ssh-rsa at the beginning.

It should be something like:

ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAIBzPeFQv+295iKzuuPH0jA9449pSHVpCwXvCR9EstmYh...


chmod 600 authorized_keys2


4. Add Private key to PuTTY SSH authentication agent

Start the PuTTY SSH authentication agent PAGEANT.EXE. When started, right-click its syspanel icon...

Screen shot: Pageant - syspanel icon

... and select "add key". Select your private key file, and type in your passphrase when you add the key. The Pageant works as a passphrase keeper.


5. Use PuTTY to connect to your server

Open PuTTY and connect as autotimesheet@yourserver:

Screen shot: PuTTY - connect to a server

See that you log in without a password ...

Screen shot: PuTTY - Authenticating with public key from agent

Share this page:

9 Comment(s)

Add comment


From: Suno Ano

Hi folks,

I wrote an article about PKA as well

 Maybe someone might find it useful ...

From: Anonymous

 i wrote anything you need to know and more at that site

plus : you get an automatic script.



From: Suno Ano

Hi there ... 


Your howto advices people to use scp to transfer the public key to the remote machine. This often causes permission problems. The prefered way is to use ssh-copy-id as shown here

Also, just to stress the fact again, a keypair should always be protected by a passphrase i.e. "leaving empty for no password" should not be done:



Personally, I am now using Monkeysphere on top of PKA all the time now because it also solves the problem how to authenticate servers and users:

From: dhanesh mane

perfect article. Works perfect and steps are really explained properly. Only thing is I am using ubuntu so at 3rd step I used sudo su -l autotimesheet command instead of su autotimesheet

Thanks a lot for such a nice article.

From: Anonymous
From: wese

I believe you didn't set the owner right.

chown -R autotimesheet. /home/autotimesheet/.ssh

From: Nick

The authorized_keys2 file has been deprecated since the OpenSSH 3.0 release (2001).


From: Colin

Thank you very much for the nice introduction :-) I liked it a lot and I am glad to not retype my password every time I connect to my server

From: Anon

Should the == (with a space after) be included at the end of the key?