SSH Private Keys

You can log on to a Linux server or VM running Linux OS using the Identity/Pubkey authentication method. The Identity/Pubkey authentication method helps protect against malicious applications like keyloggers, strengthens the security level and simplifies launch of automated tasks.

To use the Identity/Pubkey authentication method, you must generate a pair of keys — a public key and private key:

  • Public key is stored on Linux servers to which you plan to connect from the backup server. The key is kept in a special authorized_keys file containing a list of public keys.
  • Private key is stored on the client machine — backup server. The private key is protected with a passphrase. Even if the private key is intercepted, the eavesdropper will have to provide the passphrase to unlock the key and use it.

For authentication on a Linux server, the client must prove that it has the private key matching the public key stored on the Linux server. To do this, the client generates a cryptogram using the private key and passes this cryptogram to the Linux server. If the client uses the "correct" private key for the cryptogram, the Linux server can decrypt the cryptogram with a matching public key.

Veeam Backup & Replication has the following limitations for the Identity/Pubkey authentication method:

  • Veeam Backup & Replication does not support keys that are stored as binary data, for example, in a file of DER format.
  • Veeam Backup & Replication supports only keys whose passphrase is encrypted with algorithms supported by PuTTY:
  • AES (Rijndael): 128-bit, 192-bit and 256-bit CBC or CTR (SSH-2 only)
  • Blowfish: 128-bit CBC
  • Triple-DES: 168-bit CBC

Tip

Veeam Backup & Replication 12 supports PPK file versions 2 and 3.

  • Passphrases generated in PuTTY must only contain ASCII characters. Unicode characters can create decoding issues in Veeam Backup & Replication.

Veeam Backup & Replication supports the following key algorithms: RSA, DSA, ECDSA, EdDSA (ED25519). For these algorithms you can use the following key formats:

Key Formats

Key Algorithms

RSA

DSA

ECDSA

EdDSA (ED25519)

PEM

SSH Private Keys) 

SSH Private Keys) 

SSH Private Keys) 

SSH Private Keys) 

private

SSH Private Keys) 

SSH Private Keys) 

SSH Private Keys) 

SSH Private Keys) 

private-openssh

SSH Private Keys) 

SSH Private Keys) 

SSH Private Keys) 

SSH Private Keys) 

sshcom

SSH Private Keys) 

SSH Private Keys) 

SSH Private Keys) 

SSH Private Keys) 

PKCS8

SSH Private Keys) 

SSH Private Keys) 

SSH Private Keys) 

SSH Private Keys) 

RDC4716 (private-openssh-new)

SSH Private Keys) 

SSH Private Keys) 

SSH Private Keys) 

SSH Private Keys) 

Important

If you use VMware VIX/vSphere Web Services, Veeam Backup & Replication does not support usage of public keys for guest processing on Linux guest servers.

You can create a new credentials record using the Identity/Pubkey authentication method in one of the following ways:

 

Page updated 7/31/2025

Page content applies to build 13.0.0.4967