61050: Acronis Cyber Infrastructure: using SSH keys to access and manage Acronis Storage

use Google Translate

This article is intended for Acronis Cyber Infrastructure administrators using Acronis Cyber Infrastructure in combination with Acronis Backup Cloud, Acronis Backup Advanced 12.5, or as a general-purpose storage. This article explains how to generate, install and use SSH keys to connect Acronis Cyber Infrastructure in Windows environment using popular third-party tool PuTTY. 


Usually SSH keys might come in handy than you need to provide someone (e.g. Acronis Technical support engineer) with temporary access to your Acronis Cyber Infrastructure cluster without revealing or changing your root password. This type of access could be easily granted and easily withdrawn. 


Generate SSH key 

  1. Download one of the PuTTY full package files from here and install them.
  2. Open PuTTYgen utility. Choose type of key to generate to be RSA, Number of bits in generated key 2048 and click Generate:
  3. Follow the on-screen instructions:
  4. Enter your email address or any other human-readable key identifier under Key comment field. In case you would like to additionally protect your key with a passphrase, enter the passphrase in the respective field.
  5. Click the Save private key button to save your private key to the file. For the purposes of this instruction, we will use pub1.ppk file name for the public key. 
  6. Copy all the data in Public key for pasting into OpenSSH authorized_keys file

Install SSH key 

  1. Open Acronis Cyber Infrastructure Web Control Panel.
  2. Navigate to Settings -> Security and click Add to add the SSH key:
  3. Insert the public key copied from PuTTYgen window in the previous steps to the key field and click ADD KEY:


Set up SSH client to connect using SSH key

  1. Under Host Name field, enter Acronis Cyber Infrastructure node IP address or hostname:
  2. Under Connection -> Data item of the Category menu on the left, enter Auto-login username to be root:
  3. Under Connection -> SSH -> Auth of the same menu, click Browse under Private key file for authentication. Navigate to the Private key file saved on the previous steps of this instruction and choose it.
  4. (Optional) To be able to re-use the same connections settings in future scroll the Category menu to the top and click Session. Under Saved Sessions, provide a name for the session and click Save:
  5. To establish connection, click Open. You should be authenticated to Acronis Cyber Infrastructure either without any manual input, or after providing the SSH key passphrase created in the previous steps of this instruction. 

More information

Should you need more details on using SSH keys in other OSes or using other third-party software, please contact Acronis Technical support or respective third-party software vendor. 


You are reporting a typo in the following text:
Simply click the "Send typo report" button to complete the report. You can also include a comment.
This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.
6 + 10 =
Solve this simple math problem and enter the result. E.g. for 1+3, enter 4.