If you are not going to use a domain name, a public ip address would also work instead of domain.com ๐
Find the location section in the file and replace it with:
SSH is the acronym of Secure Shell, which is one of the popular networking protocols.
SSH uses cryptography to authenticate and encrypt connections between devices. To be more specific, it uses asymmetric encryption. Cryptography is out of scope for the purpose of this article though.
-t: Type of key, typically you would use rsa or ed25519
-C: Comment, typically you would use your name or email. Used for identifying whose key it is.
-b: Byte length of the key, optional
You will be prompted for a few questions, it’s okay to choose default for all. So you didn’t specify a custom key file name or a custom key file path, then you will be able to find the created key files:
In some situations, you are given only a ppk file for access to a cloud server. You know, however, it’s for Putty on windows, not for OpenSSH client which might be the most familiar to you.๐ค
This post explains a method to convert a ppk file into a pem file so that you can login to the linux server with ssh command that you are most familiar with.