Overview
Loupp allows you to manage SSH keys, configure access permissions, and maintain secure connections to your server. The system automatically attaches your account SSH keys to newly created servers and manages access control.SSH Key Management
Adding New SSH Keys
Access SSH management
Navigate to your dashboard and click on the “SSH Keys” section to access the SSH key management interface.
Configure key details
Fill in the SSH key configuration:
- Name: Choose a descriptive name for your SSH key (e.g., “MacBook Pro”, “Work Laptop”)
- Public Key: Paste your SSH public key content in the standard OpenSSH format
SSH Key Deployment
Automatic Deployment
When you add an SSH key to Loupp:- Key Validation: The system validates the SSH key format and ensures uniqueness across your account
- Future Server Integration: The key is automatically added to any new servers you create
- Existing Server Management: You can manually add SSH keys to existing servers using the “Add to Servers” button
Managing SSH Keys
Adding Keys to Existing Servers
Removing SSH Keys
Select key to remove
Click the actions dropdown (three dots) next to the SSH key you want to remove.
Default SSH User
Loupp creates a default user account for SSH access:- Username:
loupp(default system user) - Sudo Access: Full administrative privileges
- Home Directory:
/home/loupp - Shell Access: Full bash shell access
The default SSH user has sudo privileges, allowing you to perform administrative tasks on your server.
Connecting to Your Server
Using SSH Client
Connect to your server using any SSH client:Troubleshooting SSH Issues
SSH Service Issues
If you cannot connect via SSH:- Check Server Status: Ensure the server is running and accessible
- Verify SSH Service: Check if the SSH daemon is running
- Review Firewall Rules: Ensure SSH port is open in the firewall
- Check Logs: Review SSH logs for error messages
Proper SSH key management ensures secure, controlled access to your servers while maintaining security best practices. The system automatically handles deployment and removal, making it easy to manage access across multiple servers.