

ppk format, you may skip this step.įollow the steps below to convert your. ppk format before you can use it with PuTTY. pem format, it is necessary to convert it to PuTTY’s own. Step 2: Convert your PEM private key to PPK format (optional) Double-click the putty.exe file to bring up the PuTTY configuration window.Extract the contents to a folder on your desktop.

Ssh tunnel log archive#
Ssh tunnel log password#
If you have configured password authentication, you must have the password for the bitnami user account instead of the private key. NOTE: When connecting with an SSH client, you must have the server’s IP address and the SSH private key for the bitnami user account in. If you prefer to use password authentication, follow these instructions to configure the SSH server to support password authentication. IMPORTANT: Before following the steps below, ensure that you have enabled the SSH server (disabled by default) and that your application server is running.īy default, you can log in to the virtual machine over SSH using key-based authentication. Modify the available memory for the virtual machine.Auto-configure a Let's Encrypt certificate.Connect to the virtual machine from another host.Configure the application's IP address or hostname.Learn about the Bitnami Configuration Tool.Configure third-party SMTP for outbound emails.Modify the default login password for the virtual machine.Understand what data Bitnami collects from deployed Bitnami stacks.Learn about Bitnami PHP application modules deprecation.Understand the default directory structure.Learn about the SSH warning 'REMOTE HOST IDENTIFICATION HAS CHANGED'.Configure password-based SSH authentication.Frequently Asked Questions for Virtual Machines
