Use SSH Keys with PuTTY and WinSCP for TanOS

Generate the SSH key with PuTTYgen, add the public key to the TanOS user, then use the private key in PuTTY or WinSCP.

Choose the User

  • tanadmin: admin shell access
  • tancopy: file transfer with SFTP / WinSCP
  • recovery: recovery access if this user exists on the appliance

Create one key per user if you want clean separation between admin access and file transfer.

Generate the Key with PuTTYgen

Install PuTTY and PuTTYgen

Create the Key

  • Open PuTTYgen.
  • Use Ed25519. If you need old compatibility, use RSA 4096.
  • Click Generate and move the mouse to create randomness.
PuTTYgen generating the SSH key

Save the Private Key and Copy the Public Key

  • Click Save private key.
  • Store the .ppk file in a safe location.
  • Use a passphrase if possible.
Save private key in PuTTYgen
  • Copy the public key from the top box in PuTTYgen.
  • Paste this public key in the SSH key field of the TanOS user account.
Copy the public key from PuTTYgen

Tip: Use Pageant if you want to cache the key and avoid typing the passphrase many times.

Connect with PuTTY

Configure the Session

  • Open PuTTY.
  • In Session, enter the TanOS host name, IP, or FQDN.
  • Go to Connection > SSH > Auth.
  • Set the Private key file for authentication to the correct .ppk.
PuTTY configured with a private key

Save the Session

  • Go back to Session.
  • Enter a name, for example Tanium-Server1.
  • Click Save.
Save the PuTTY session

Open the SSH Session

  • Click Open.
  • At first connection, check and accept the server host key fingerprint.
  • Enter the user name linked to the key: tanadmin, tancopy, or recovery.
  • If the key matches, no password is needed.

Transfer Files with WinSCP

Create the Session

  • Open WinSCP.
  • File protocol: SFTP.
  • Host name: TanOS IP or FQDN.
  • User name: tancopy.
WinSCP session for the tancopy user

Select the Private Key

  • Click Advanced.
  • Go to SSH > Authentication.
  • Set the Private key file to the .ppk for tancopy.
  • Click OK to return to the main screen.
WinSCP configured with the private key

Save and Connect

  • Click Save if you want to keep the session.
  • Click Login to connect.
  • If the key has a passphrase, WinSCP asks for it unless Pageant already has the key loaded.
WinSCP connected with key-based authentication

Good Practices

  • Use Ed25519 when possible.
  • Use a strong passphrase for private keys.
  • Do not store private keys on shared drives.
  • Use one key per user or per admin if you want better access control.

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.