SSH.AC Guides

Step-by-step tutorials and best practices for getting the most out of SSH.AC

Getting Started

New to SSH.AC? Start here with these beginner-friendly guides

Setting Up Your First SSH.AC Project

This comprehensive guide will walk you through creating your first SSH.AC project, setting up users, and deploying your first application. Perfect for those new to secure shell hosting.

1

Creating your account

2

Configuring your first server

3

Managing SSH keys and access

ssh.ac - Getting Started
$ ssh-keygen -t ed25519 -C "[email protected]"

Generating public/private ed25519 key pair.

Enter file in which to save the key (/home/username/.ssh/id_ed25519):

Press enter to use default location

Enter passphrase (empty for no passphrase):

Enter a secure passphrase

Your identification has been saved in /home/username/.ssh/id_ed25519

Your public key has been saved in /home/username/.ssh/id_ed25519.pub

$ cat ~/.ssh/id_ed25519.pub

ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJKn7dGq2T1qrq6j9HO2c7tM...ample

$ ssh-ac setup --server my-first-server

Setting up SSH.AC server "my-first-server"...

Creating server configuration...

Applying security policies...

Configuring authorized keys...

Success! Your server is ready to use.

SSH Key Management

Learn how to generate, manage, and securely store SSH keys for your team members. Covers best practices for key rotation and access control.

Multi-Server Setup

A comprehensive guide to configuring multiple servers in SSH.AC, with load balancing, failover, and centralized management.

Deploying with Git

Learn how to set up Git-based deployments with SSH.AC, enabling seamless continuous deployment workflows for your applications.

Security Guides

Protect your infrastructure with these security best practices

Security

Hardening SSH Configuration

A comprehensive guide to configuring SSH for maximum security. Learn how to prevent common attacks and secure your access points.

Two-Factor Authentication

Implementing 2FA with SSH

Add an extra layer of security to your SSH connections by implementing two-factor authentication with SSH.AC.

Audit Logs

SSH Audit Logging and Monitoring

Learn how to set up comprehensive logging and monitoring of SSH sessions to detect and respond to security incidents.

Advanced Topics

Take your SSH skills to the next level with these advanced guides

SSH Tunneling and Port Forwarding

Learn how to use SSH tunnels to securely access services behind firewalls and create encrypted connections between networks.

  • Local Port Forwarding - Access remote services as if they were local

  • Remote Port Forwarding - Expose local services to remote clients

  • Dynamic Port Forwarding - Create a SOCKS proxy for browsing

SSH Certificate Authentication

Move beyond traditional SSH keys to certificate-based authentication for better security and simplified key management.

  • Creating a Certificate Authority - Set up your own SSH CA

  • Signing User Keys - Issue certificates to users

  • Host Certificates - Verify server identities

Integration Guides

Learn how to integrate SSH.AC with your favorite tools and services

GitHub

GitHub Actions

Learn how to integrate SSH.AC with GitHub Actions for seamless CI/CD pipelines and automated deployments.

Ansible

Ansible

Configure and manage your SSH.AC infrastructure using Ansible for automated provisioning and configuration management.

Kubernetes

Kubernetes

Integrate SSH.AC with Kubernetes for secure access to cluster resources and simplified container management.

Terraform

Terraform

Use Terraform to provision and manage your SSH.AC infrastructure as code for consistent and repeatable deployments.

Docker

Docker

Learn how to use SSH.AC with Docker containers for secure access to containerized applications and management.

Jenkins

Jenkins

Set up secure deployment pipelines using Jenkins and SSH.AC for reliable and secure continuous delivery workflows.

Troubleshooting Guides

Solutions to common issues and challenges

Ready to get started? Create your SSH.AC account today.