JSCAPE
  • Products
    • Managed File Transfer
    • JSCAPE SaaS
    • MFT Gateway
    • MFT Monitor
    • All Products
  • Solutions
    • All Solutions
    • Secure File Transfer
    • AS2 Server Software
    • File Synchronization
    • Reverse Proxy
    • Compliance
    • DMZ Streaming
  • Pricing
  • Company
    • Blog
    • Company
    • Contact Us
    • Clients
    • Case Studies
    • Testimonials
    • Certifications
  • Support
    • Help Desk
    • Documentation
    • Customer Downloads
Get a demo

Public key authentication using PuTTY and WinSCP

Words by

Anthony Bryan

Public Key Authentication (PKA) is a more secure way to authenticate to a server than just using passwords. If you’re security conscious (and who shouldn’t be?) you’ll want to enable it on your server for SFTP. Using PKA involves a little more effort during the set up phase than just passwords, but it’s worth it…

Published in:

Blog

/

JSCAPE MFT, Managed File Transfer, Secure File Transfer, Videos

Public Key Authentication (PKA) is a more secure way to authenticate to a server than just using passwords. If you’re security conscious (and who shouldn’t be?) you’ll want to enable it on your server for SFTP. Using PKA involves a little more effort during the set up phase than just passwords, but it’s worth it for the added security.

Here, I demonstrate in the video and describe in the text how to generates keys in PuTTYgen, import and associate the public key with a user account in JSCAPE MFT Server Manager, and connect over SFTP using WinSCP.

 

 

1) Generate a public/private keypair using PuTTYgen (PuTTY Key Generator).

First, download PuTTYgen from this link : https://www.chiark.greenend.org.uk/~sgtatham/putty/download.html

You can either download just PuTTYgen or a Windows installer for most of the other PuTTY files.

If you use the Windows installer, you can run PuTTYgen from All Programs -> PuTTY -> PuTTYgen.

puttygen resized 600

After you run PuTTYgen, click the Generate button to generate a public/private key pair. Then you’ll want to put in a passphrase in the “Key Passphrase” and “Confirm Passphrase” fields. You’ll need to remember the passphrase when you use your private key. Now you’ll want to Save the public key and Save the private key by pressing their respective buttons and putting in a filename.

2) Import the public portion into the Client Keys tab in Key Manager in JSCAPE MFT Server Manager.

Public Key Authentication using Putty and WinSCP

Now run JSCAPE MFT Server Manager. Then go to File -> Key Manager and make sure you click the Client Keys tab. (Make sure you’re NOT on the Server Keys tab). From the Client Keys tab, click Import. From there, you’ll put in an Alias like the login you’re going to associate the public key with. Then click Browse, to select the public key file that you saved in Step 1. Then click OK to finishing importing the public key.

3) Associate with the user account on the User node in JSCAPE MFT Server Manager.

Public Key Authentication using Putty and WinSCP

Go to the Users node then select the user account you want to associate with the public key you just imported. Click Edit to open up the Edit User Account window. Look at the Client Keys section. Depending on how many keys are on the server, you may have to scroll down. Double click the one you want. It will be named with the Alias you provided in Step 2. Click OK.

Note that to use, it MUST be enabled on the Services node, by clicking SFTP then edit. There you must change the Authentication type to “publickey”, “password OR publickey”, “password AND publickey”. “publickey” means you login with just the public key and a password isn’t used, “password OR publickey” means you could login with either a password or a public key, and “password AND publickey” means you can only login with both a password and public key.

4) Use the private key with WinSCP client to connect using the private key to the SFTP service on JSCAPE server.

Public Key Authentication using Putty and WinSCP

Run WinSCP.

Under Session, you’ll want to fill out the Host name, user name, and password fields with the appropriate values. Click the button to the right of the Private key file field and browse to the Private key you saved at the end of Step 1. It will have a .ppk file extension. The protocol should be set to SFTP. If you’re going to connect to this server again, click Save to save it. Now you can click Login. A “Key passphrase – user@server” window will pop up. Here you need to use the passphrase you entered (and remember forever) from the end of Step 1. Click OK and you’ll be logged in!

Now that it’s all set up, you can just click “Login” from WinSCP next time. It’s just a small amount of worhtwhile effort at the beginning for vastly improved security.

References

JSCAPE MFT Server

Easy To Deploy, Easy To Administer, Easy To Manage

Ready to see how JSCAPE makes managed file transfer so much simpler? Schedule your demo now.

Request a demo

Popular Articles

View more by

JSCAPE
  •  
    1–2 minutes
    23/09/2025

    JSCAPE by Redwood, version 2025.3: New UI continues to make a splash

    Dive back into JSCAPE by Redwood with version 2025.3, bringing more modern UI updates to make using and navigating JSCAPE more intuitive. 

    Read article

  •  
    1–2 minutes
    19/08/2025

    Weathering the economic storm: Expert support is your enterprise file transfer system’s lifeline

    The global economic landscape can be described by one word: “uncertain”. Lingering effects from the 2020 pandemic, combined with new waves of international tariffs throughout 2025, have…

    Read article

  •  
    1–2 minutes
    30/07/2025

    Escape the grip: Why flexible MFT is key to enterprise agility

    Break free from costly vendor lock-in Let’s be blunt: some MFT vendors have built product suites that are less about true partnership and more about proprietary siloing.…

    Read article

  •  
    1–2 minutes
    23/07/2025

    Avoid downtime and threat actors: Getting the best of both worlds in MFT

    For enterprise organizations relying on managed file transfer (MFT) solutions, cybersecurity often feels like an arms race. The need to patch MFT software vulnerabilities to prevent breaches…

    Read article

Related Content

Read more about

JSCAPE MFT
  •  
    1–2 minutes
    30/07/2025

    Escape the grip: Why flexible MFT is key to enterprise agility

    Break free from costly vendor lock-in Let’s be blunt: some MFT vendors have built product suites that are less about true partnership and more about proprietary siloing.…

    Read article

  •  
    1–2 minutes
    03/07/2025

    Consolidate, deploy and thrive: JSCAPE’s formula for MFT success in uncertain times

    Global enterprises today are navigating a landscape marked by significant economic volatility. Fluctuating markets, shifting trade policies and persistent economic uncertainty are compelling enterprise organizations to reevaluate…

    Read article

  •  
    1–2 minutes
    31/03/2025

    SFTP vs. FTPS: Which file transfer software is best for business use?

    What is SFTP? SFTP is a file transfer protocol that’s normally packaged with Secure Shell (SSH), the network protocol most IT administrators use to access and manage…

    Read article

  •  
    1–2 minutes
    25/03/2025

    EDI integration with trading partners: 6 best practices

    Many large companies with high-volume transactions, especially those involved in e-commerce, manufacturing and retail supply chains, have long migrated from manual processes to Electronic Data Interchange (EDI).…

    Read article

Company

  • About Us
  • Contact Us
  • Clients
  • Case Studies
  • Testimonials
  • Privacy Policy
  • Certifications

Resources

  • Managed File Transfer
  • Secure File Transfer
  • Secure FTP Server
  • AS2 Server
  • Reverse Proxy
  • File Upload Processing
  • What Is An AS2 Server?

Support

  • Help Desk
  • Documentation
  • Customer Downloads
JSCAPE

Copyright © 2025 JSCAPE

  • Privacy Policy
  • Cookie Settings