How to create SSH profiles?

Since Splashtop Connector v1.2.0.0, SSH resources will be available for the Splashtop Business app to access by setting up Profiles. A profile setting consists of three sections: General settingsStreamer settings, and SSH settings

You can create multiple Profiles in the Splashtop Connector. These SSH resources will contribute to the total number of computers on your Splashtop team. 

Enable the profile to make the SSH resource available for SSH access. 

SSH profile entry_en-US.png

SSH Settings 1_en-US.png

SSH Settings 2_en-US.png

 

General Settings

  • Profile Name, which will be shown in the Splashtop Business client app. Give the Profile a meaningful name to let users know what the SSH machine is for. 
  • Save session transcript locally, Turn this on to automatically save session transcripts for this
    resource, which can be set on an individual Profile basis. The recordings are saved in the specified path on the Splashtop Connector machine.

Streamer Settings

  • Deploy code, Enter a Splashtop deployment package code to determine the
    SSH resource's default computer group and access permissions. Please see this article on how to create deploy packages. Once created, enter the deployment code in this field.

SSH Settings

  • Remote Computer, you can pre-configure a remote computer's IP/DNS or ask the user to input this info when connecting to the machine.
    • Ask user to specify the remote computer to connect to require users to enter the SSH machine’s IP/hostname upon connecting. This may be
      useful for ad-hoc support.
      • Enable IP restriction configuration, you can specify the whitelist/blacklist of the target SSH computers. 
    • Fixed computer with specified information, allow IT admins to preconfigure the SSH machine's specific IP/hostname and port.
      • Use preset public key authentication, Instead of password authentication, you can turn on public key authentication and select the preconfigured private key.
  • Security Check
    • Allow connection to hosts with an unknown fingerprint, user can connect to the SSH computer with unknown SSH Host Fingerprints. When you successfully connect to the SSH server, the fingerprint will be automatically added to the SSH Host Fingerprints in SSH keys.
    • Allow connection to hosts with a provisioned fingerprint, user can only connect to the SSH computer with the pre-configured SSH Host Fingerprints in SSH Keys.

You can enable this profile immediately by turning on Enable this profile immediately after saving or enabling it in the main window. 

SSH Keys

Additionally, you can go to Settings -> SSH Keys to manage your private keys and SSH Host Fingerprints in the Splashtop Connector. 

SSH Key Entry_en-US.png

SSH Key_en-US.png

  • SSH Private Keys, allow IT admins to configure the private keys for SSH authentication by manually adding or importing.
  • SSH Host Fingerprints, allow IT admins to configure the SSH host fingerprints by manually adding or importing.

Helpful links

 

0 out of 0 found this helpful