Step 4. Specify SSH Connection Settings

This step is available if you have selected to upgrade a Linux-based backup proxy server at the Select Backup Proxy Server to Upgrade step of the wizard.

At this step of the wizard, enter a user account credentials to connect to the backup proxy server and configure the SSH connection settings.

Note

If you want to upgrade multiple Linux-based backup proxy servers, you must specify the SSH connection settings that Veeam Backup for Microsoft 365 can use to connect to all selected Linux-based backup proxy servers.

To configure the SSH connection settings, do the following:

  1. In the Account field, enter a user name.
  2. In the Password field, enter a password. The password is required in all cases except when you use a user with enabled NOPASSWD:ALL setting in /etc/sudoers.
  3. If you specified credentials for a non-root account that does not have root permissions on a Linux machine, click Advanced to grant the sudo rights to this account. For more information, see Configuring Advanced Settings.
  4. Select the Private key is required for this connection check box if you want to use the Identity / Pubkey authentication method. For more information, see Using Identity / Pubkey Authentication.

Do the following:

  1. In the Private key field, enter a path to the private key or click Browse to select a private key.
  2. In the Passphrase field, specify a passphrase for the private key on the Veeam Backup for Microsoft 365 server.
  1. In the SSH Port field, specify a number of the SSH port to connect to a Linux machine. By default, port 22 is used.
  2. In the SSH Timeout field, specify the SSH connection timeout. This timeout is used to wait for connection to the specified backup proxy server through SSH. The default value is 30000 milliseconds.

Upgrading Backup Proxy Servers

Configuring Advanced Settings

To grant the sudo rights to the non-root account, in the Advanced Settings window, do the following:

  1. Select the Elevate specified account to root check box to provide a non-root user with root account privileges.
  2. Select the Add account to the sudoers file automatically check box to add the user account to the sudoers file. In the Root password field, enter the password for the root account.

Note

If you do not select the Add account to the sudoers file automatically check box, you must add the user account to the sudoers file manually.

  1. Select the Use su if sudo is unavailable check box to enable failover using the su command for distros where the sudo command is not available. In the Root password field, enter the password for the root account.

Configuring Advanced Settings

Using Identity / Pubkey Authentication

The Identity / Pubkey authentication method helps to protect against malicious applications like keyloggers, strengthens the security level and simplifies launch of automated tasks.

To use the Identity/Pubkey authentication method, you must generate a pair of keys — a public key and private key:

For authentication on a Linux machine, the client must prove that it has the private key matching the public key stored on the Linux machine. To do this, the client generates a cryptogram using the private key and passes this cryptogram to the Linux machine. If the client uses the "correct" private key for the cryptogram, the Linux machine can decrypt the cryptogram with a matching public key.

For more information about supported key algorithms and key formats, see Supported Key Algorithms and Key Formats.