Skip to main content

Search this Site

DartPulse Alerts

Chrome Printing Issues


DartPulse Outages

Overall System Status:

Upcoming Scheduled Outages

New to Dartmouth?

Resources for:

Information Security

Connect with ITS

facebook twitter Wordpress Blog

Connect with SSH Secure Shell

There are two ways to use SSH Secure Shell to connect to remote computers.

If you have created a bookmark (or "Profile" as SSH Secure Shell calls them), you can use that to connect.
If you want to connect to a machine only once, Method 2 below shows you how to do so without creating a bookmark.

Method 1

  1. After you have made a bookmark (see Create Bookmarks Using SSH Secure Shell/SFTP), click Profiles, then click on the profile name that you created:

    Open file
  2. A window similar to the one below will appear:

    Enter password

    Or you may see a window similar to the one below:


    If you have not connected to the remote computer from your personal computer before, you do not have a host key saved for that remote host. A host key is part of the system that makes SSH
    secure (see SSH Secure Shell and SFTP Connections). To save the host key to your remote computer, click Yes.
  3. At the prompt, enter your password. If you enter it incorrectly, SSH Secure Shell will continue to prompt you until you enter it correctly.
  4. A window similar to the one below will appear:


    Note: If you are connecting to an SGI computer (delta, an 02, or an Indy), you will have to re-enter your password before getting a prompt. This problem is caused by a bug in AFS/ssh.

Top of page

Method 2

  1. For step #1, instead of using a bookmark, press the [space bar] or [enter] key. A window will pop up similar to the one below:

    Connect to remote host
  2. Enter the Host Name and User Name (just as if you were creating a bookmark), then click Connect.
  3. Now follow the instructions above, starting with step #2.

    Note: The connection information is not saved in a bookmark, but if you have to connect to multiple computers only once, this method can definitely be a time saver.

Top of page

Additional Features

X Forwarding: See Enable X Tunneling Using SSH Secure Shell.

Top of page

Last Updated: 2/8/10