[Last Call] Learn about multicloud storage options and how to improve your company's cloud strategy. Register Now

x
?
Solved

.pem file with SecurtCRT

Posted on 2013-06-03
2
Medium Priority
?
1,831 Views
Last Modified: 2013-06-03
Hi,
I have a issue that breaks my head and hope that maybe someone can give me a tip.
I use SecureCRT and also WinSCP to login to my remote server. I had a Firewall set-up and they gave me a .pem file and told me to use this to connect in the future when I do a remote SSL connection.
Well that is good and in WinSCP there is actually a tool called PuTTYgen that allowed me to create a ppk file from the pem file.
However I prefer SecureCRT and this seems to require a .pub file. But I searched everywhere on how to convert this pem file to a pbb file that can be used with SecureCRT.
Its killing me and it seems that either I googled for the wrong stuff of nobody else has this issue, maybe I just do not get it. So any tip on how I can use SecureCRT to connect to my remote server again using the .pem file would be very appreciated.

Best wishes,
thom
0
Comment
Question by:Thomanji
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 68

Accepted Solution

by:
woolmilkporc earned 2000 total points
ID: 39215757
If you have "ssh-keygen" from OpenSSH you can run

ssh-keygen -y -f private_key1.pem > public_key1.pub

You can also use PuTTYGen to convert your ppk file to OpenSSH format.

Just start PuTTYGEN, click "Load an existing private key", The upper part of the window now contains a public key to paste into the authorized_keys file.

You can also load your private ppk file under "Conversions", then, also under "Conversion" export an OpenSSH private key.
0
 

Author Closing Comment

by:Thomanji
ID: 39215809
Thanks, I actually figured it out, there is a way to use a .pem file direct. but thank you for the suggestion.
0

Featured Post

Learn Veeam advantages over legacy backup

Every day, more and more legacy backup customers switch to Veeam. Technologies designed for the client-server era cannot restore any IT service running in the hybrid cloud within seconds. Learn top Veeam advantages over legacy backup and get Veeam for the price of your renewal

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses

650 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question