

Note: The angle brackets «» should not appear in your code.

To list the contents of the public key, use the cat command cat >.pub The public key will be needed for various activities and can be uploaded to certain systems as well as copied and pasted to facilitate secure communications in the cloud. Keep the private key safe and don’t share its content with anyone. Note in the output that there are two files, a private key: > and a public key: >.pub.

This will be the key name you will use to connect to any compute instances you create. Once the cloud shell has started, enter the following commands. To start the Oracle Cloud shell, go to your Cloud console and click the cloud shell icon at the top right of the page. To use the Cloud Shell machine, your tenancy administrator must grant the required IAM (Identity and Access Management) policy. Cloud Shell comes with a pre-authenticated OCI CLI (Command Line Interface), set to the Console tenancy home page region, as well as up-to-date tools and utilities. The Cloud Shell machine is a small virtual machine running a Bash shell which you access through the OCI Console (Homepage). Watch the video below for an overview of the Generate SSH Keys Cloud Shell option. Please ensure you create your key properly. Important: If the SSH key is not created correctly, you will not be able to connect to your environment and will get errors. However, if you prefer to connect via your laptop, please select an option based on your configuration. Oracle Cloud Shell is browser-based, does not require installation or configuration of anything on your laptop, and works independently of your network setup. We recommend you use the Oracle Cloud Shell to interface with the OCI compute instance you will create. If you already have an SSH key pair, you may use that to connect to your environment. SSH keys are an important part of securely accessing Oracle Cloud Infrastructure compute instances in the cloud. SSH enables secure system administration and file transfers over insecure networks using encryption to secure the connections between endpoints. The SSH (Secure Shell) protocol is a method for secure remote login from one computer to another. When completing your lab, substitute these values with ones specific to your cloud environment.

To sign up for a free account, see Get started with Oracle Cloud Infrastructure Free Tier. This tutorial requires access to Oracle Cloud.
