Manage Security
Manage Security
Manage Security Group
Security Group acts as virtual firewall to control the inbound and outbound traffic of Virtual Machine Instance to improve security. Security Group provides Stateful Packet Inspection (SPI) and packet filtering capabilities. You can use security group and its rules to define security domains in the Cloud.
View Security Group
On the left menu bar, go to Security ->Security Group, If you configured security groups, they are displayed on this page, as shown below.
Create Security Group
-
On the left menu bar, go to Security-> Security Group, and click Create Security Group.
-
Within the Create SSH Key panel that appears, you can add rules to allow access to or from specific destinations or sources on specific ports. Follow the principle of least authorization when you add security group rules. For example, to allow connections to port 22 on an instance, we recommend that you add a rule to allow access from only specific IP addresses instead of all IP addresses (0.0.0.0/0).
-
Specify identifiable names and descriptions for security groups for easy search and management.
-
Click the Create Security Group button to save your configuration. You should now see that security group on the Security Groups page.
Delete Security Group
-
On the left menu bar, go to Security-> Security Group, and click on the Delete button next to the corresponding Security Group you would like to delete. You are prompted to confirm deletion of the Security Groups. Click Delete to proceed.
Manage SSH Key
When creating a Compute Instance, you have the opportunity to select one or more SSH keys, which are added to the root user account of the new instance. This allows you to login over SSH using your associated private key instead of the root password.
View SSH Key
On the left menu bar, go to Security ->SSH Key, if you have uploaded any public keys, they are displayed on this page, as shown below.
Create a SSH Key
-
On the left menu bar, go to Security-> SSH Key, and click Create SSH Key.
-
Within the Create SSH Key panel that appears, paste your public key into the SSH Key field, and enter a label name, a description for your key . To find and copy your public key on your local machine, use one of the following methods:
-
Windows 11 (or 10), macOS, Linux: If you created your key pair using most command-line tools, your public key is likely stored in a
.ssh
directory within your home folder and is likely calledid_rsa.pub
. You can view your public key by opening PowerShell (Windows) or the terminal (macOS and Linux) and running the following command:cat ~/.ssh/id_rsa.pub
-
Windows (through PuTTY): When using PuTTY to generate your key pair, the public key is stored as a
.ppk
file. Open this file using PuTTY to view your public key.
-
-
Click the Create SSH Key button to save your key. You should now see that public key on the SSH Keys page.
Delete a Public Key
If you no longer wish to deploy new Compute Instances with a certain SSH key, you can remove it from the Cloud Manager. When doing so, the SSH key is not removed from any existing Compute Instances that may have used it.
-
On the left menu bar, go to Security-> SSH Key, and click on the Delete button next to the corresponding SSH Key you would like to delete. You are prompted to confirm deletion of the SSH Key. Click Delete to proceed.
-
To confirm removal, click the Delete button within the confirmation dialog that appears.