Step 4. Specify SSH Connection Settings
At this step of the wizard, enter a user account credentials to connect to the specified computer and configure the SSH connection settings.
To configure the SSH connection settings, do the following:
- In the Account field, enter a user name.
- In the Password field, enter a password. The password is required in all cases except when you use a user with enabled NOPASSWD:ALL setting in /etc/sudoers.
- If you specified credentials for a non-root account that does not have root permissions on a Linux machine, click Advanced to grant the sudo rights to this account. For more information, see Configuring Advanced Settings.
- Select the Private key is required for this connection check box if you want to use the Identity / Pubkey authentication method. For more information, see Using Identity / Pubkey Authentication.
Do the following:
- In the Private key field, enter a path to the private key or click Browse to select a private key.
- In the Passphrase field, specify a passphrase for the private key on the Veeam Backup for Microsoft 365 server.
- In the SSH Port field, specify a number of the SSH port to connect to a Linux machine. By default, port 22 is used.
- In the SSH Timeout field, specify the SSH connection timeout. This timeout is used to wait for connection to the specified backup proxy server through SSH. The default value is 30000 milliseconds.
To grant the sudo rights to the non-root account, in the Advanced Settings window, do the following:
- Select the Elevate specified account to root check box to provide a non-root user with root account privileges.
- Select the Add account to the sudoers file automatically check box to add the user account to the sudoers file. In the Root password field, enter the password for the root account.
Note |
If you do not select the Add account to the sudoers file automatically check box, you must add the user account to the sudoers file manually. |
- Select the Use su if sudo is unavailable check box to enable failover using the su command for distros where the sudo command is not available. In the Root password field, enter the password for the root account.
Using Identity / Pubkey Authentication
The Identity / Pubkey authentication method helps to protect against malicious applications like keyloggers, strengthens the security level and simplifies launch of automated tasks.
To use the Identity/Pubkey authentication method, you must generate a pair of keys — a public key and private key:
- Public key is stored on Linux machine to which you plan to connect. The key is kept in a special authorized_keys file containing a list of public keys.
- Private key is stored on the Veeam Backup for Microsoft 365 server. The private key is protected with a passphrase. Even if the private key is intercepted, the eavesdropper will have to provide the passphrase to unlock the key and use it.
For authentication on a Linux machine, the client must prove that it has the private key matching the public key stored on the Linux machine. To do this, the client generates a cryptogram using the private key and passes this cryptogram to the Linux machine. If the client uses the "correct" private key for the cryptogram, the Linux machine can decrypt the cryptogram with a matching public key.
For more information about supported key algorithms and key formats, see Supported Key Algorithms and Key Formats.