Sign In
Sign In

How to Use SSH Keys for Authentication

How to Use SSH Keys for Authentication
Hostman Team
Technical writer
Linux Servers SSH
30.01.2025
Reading time: 11 min

Many cloud applications are built on the popular SSH protocol—it is widely used for managing network infrastructure, transferring files, and executing remote commands.

SSH stands for Secure Socket Shell, meaning it provides a shell (command-line interface) around the connection between multiple remote hosts, ensuring that the connection is secure (encrypted and authenticated).

SSH connections are available on all popular operating systems, including Linux, Ubuntu, Windows, and Debian. The protocol establishes an encrypted communication channel within an unprotected network by using a pair of public and private keys.

If you’re looking for a reliable, high-performance, and budget-friendly solution for your workflows, Hostman has you covered with Linux VPS Hosting options, including Debian VPS, Ubuntu VPS, and VPS CentOS or VPS Storage.

Keys: The Foundation of SSH

SSH operates on a client-server model. This means the user has an SSH client (a terminal in Linux or a graphical application in Windows), while the server side runs a daemon, which accepts incoming connections from clients.

In practice, an SSH channel enables remote terminal management of a cloud server. In other words, after a successful connection, everything entered in the local console is executed directly on the remote server.

The SSH protocol uses a pair of keys for encrypting and decrypting information: public key and private key.

These keys are mathematically linked. The public key is shared openly, resides on the server, and is used to encrypt data. The private key is confidential, resides on the client, and is used to decrypt data.

Of course, keys are not generated manually but with special tools—keygens. These utilities generate new keys using encryption algorithms fundamental to SSH technology.

More About How SSH Works

Exchange of Public Keys

SSH relies on symmetric encryption, meaning two hosts wishing to communicate securely generate a unique session key derived from the public and private data of each host.

For example, host A generates a public and private key pair. The public key is sent to host B. Host B does the same, sending its public key to host A.

Using the Diffie-Hellman algorithm, host A can create a key by combining its private key with the public key of host B. Likewise, host B can create an identical key by combining its private key with the public key of host A.

This results in both hosts independently generating the same symmetric encryption key, which is then used for secure communication. Hence, the term symmetric encryption.

Message Verification

To verify messages, hosts use a hash function that outputs a fixed-length string based on the following data:

  • The symmetric encryption key
  • The packet number
  • The encrypted message text

The result of hashing these elements is called an HMAC (Hash-based Message Authentication Code). The client generates an HMAC and sends it to the server. The server then creates its own HMAC using the same data and compares it to the client's HMAC. If they match, the verification is successful, ensuring that the message is authentic and hasn't been tampered with.

Host Authentication

Establishing a secure connection is only part of the process. The next step is authenticating the user connecting to the remote host, as the user may not have permission to execute commands.

There are several authentication methods:

  • Password Authentication: The user sends an encrypted password to the server. If the password is correct, the server allows the user to execute commands.
  • Certificate-Based Authentication: The user initially provides the server with a password and the public part of a certificate. Once authenticated, the session continues without requiring repeated password entries for subsequent interactions.

These methods ensure that only authorized users can access the remote system while maintaining secure communication.

Encryption Algorithms

A key factor in the robustness of SSH is that decrypting the symmetric key is only possible with the private key, not the public key, even though the symmetric key is derived from both. Achieving this property requires specific encryption algorithms.

There are three primary classes of such algorithms: RSA, DSA, and algorithms based on elliptic curves, each with distinct characteristics:

  • RSA: Developed in 1978, RSA is based on integer factorization. Since factoring large semiprime numbers (products of two large primes) is computationally difficult, the security of RSA depends on the size of the chosen factors. The key length ranges from 1024 to 16384 bits.
  • DSA: DSA (Digital Signature Algorithm) is based on discrete logarithms and modular exponentiation. While similar to RSA, it uses a different mathematical approach to link public and private keys. DSA key length is limited to 1024 bits.
  • ECDSA and EdDSA: These algorithms are based on elliptic curves, unlike DSA, which uses modular exponentiation. They assume that no efficient solution exists for the discrete logarithm problem on elliptic curves. Although the keys are shorter, they provide the same level of security.

Key Generation

Each operating system has its own utilities for quickly generating SSH keys.

In Unix-like systems, the command to generate a key pair is:

ssh-keygen -t rsa

Here, the type of encryption algorithm is specified using the -t flag. Other supported types include:

  • dsa
  • ecdsa
  • ed25519

You can also specify the key length with the -b flag. However, be cautious, as the security of the connection depends on the key length:

ssh-keygen -b 2048 -t rsa

After entering the command, the terminal will prompt you to specify a file path and name for storing the generated keys. You can accept the default path by pressing Enter, which will create standard file names: id_rsa (private key) and id_rsa.pub (public key).

Thus, the public key will be stored in a file with a .pub extension, while the private key will be stored in a file without an extension.

Next, the command will prompt you to enter a passphrase. While not mandatory (it is unrelated to the SSH protocol itself), using a passphrase is recommended to prevent unauthorized use of the key by a third-party user on the local Linux system. Note that if a passphrase is used, you must enter it each time you establish the connection.

To change the passphrase later, you can use:

ssh-keygen -p

Or, you can specify all parameters at once with a single command:

ssh-keygen -p old_password -N new_password -f path_to_files

For Windows, there are two main approaches:

  1. Using ssh-keygen from OpenSSH: The OpenSSH client provides the same ssh-keygen command as Linux, following the same steps.

  2. Using PuTTY: PuTTY is a graphical application that allows users to generate public and private keys with the press of a button.

Installing the Client and Server Components

The primary tool for an SSH connection on Linux platforms (both client and server) is OpenSSH. While it is typically pre-installed on most operating systems, there may be situations (such as with Ubuntu) where manual installation is necessary.

The general command for installing SSH, followed by entering the superuser password, is:

sudo apt-get install ssh

However, in some operating systems, SSH may be divided into separate components for the client and server.

For the Client

To check whether the SSH client is installed on your local machine, simply run the following command in the terminal:

ssh

If SSH is supported, the terminal will display a description of the command. If nothing appears, you’ll need to install the client manually:

sudo apt-get install openssh-client

You will be prompted to enter the superuser password during installation. Once completed, SSH connectivity will be available.

For the Server

Similarly, the server-side part of the OpenSSH toolkit is required on the remote host.

To check if the SSH server is available on your remote host, try connecting locally via SSH:

ssh localhost

If the SSH daemon is running, you will see a message indicating a successful connection. If not, you’ll need to install the SSH server:

sudo apt-get install openssh-server

As with the client, the terminal will prompt you to enter the superuser password. After installation, you can check whether SSH is active by running:

sudo service ssh status

Once connected, you can modify SSH settings as needed by editing the configuration file:

./ssh/sshd_config

For example, you might want to change the default port to a custom one. Don’t forget that after making changes to the configuration, you must manually restart the SSH service to apply the updates:

sudo service ssh restart

Copying an SSH Key to the Server

On Hostman, you can easily add SSH keys to your servers using the control panel.

Using a Special Copy Command

After generating a public SSH key, it can be used as an authorized key on a server. This allows quick connections without the need to repeatedly enter a password.

The most common way to copy the key is by using the ssh-copy-id command:

ssh-copy-id -i ~/.ssh/id_rsa.pub name@server_address

This command assumes you used the default paths and filenames during key generation. If not, simply replace ~/.ssh/id_rsa.pub with your custom path and filename.

  • Replace name with the username on the remote server.

  • Replace server_address with the host address. If the usernames on both the client and server are the same, you can shorten the command:

ssh-copy-id -i ~/.ssh/id_rsa.pub server_address

If you set a passphrase during the SSH key creation, the terminal will prompt you to enter it. Otherwise, the key will be copied immediately.

In some cases, the server may be configured to use a non-standard port (the default is 22). If that’s the case, specify the port using the -p flag:

ssh-copy-id -i ~/.ssh/id_rsa.pub -p 8129 name@server_address

Semi-Manual Copying

There are operating systems where the ssh-copy-id command may not be supported, even though SSH connections to the server are possible. In such cases, the copying process can be done manually using a series of commands:

ssh name@server_address 'mkdir -pm 700 ~/.ssh; echo ' $(cat ~/.ssh/id_rsa.pub) ' >> ~/.ssh/authorized_keys; chmod 600 ~/.ssh/authorized_keys'

This sequence of commands does the following:

  1. Creates a special .ssh directory on the server (if it doesn’t already exist) with the correct permissions (700) for reading and writing.

  2. Creates or appends to the authorized_keys file, which stores the public keys of all authorized users. The public key from the local file (id_rsa.pub) will be added to it.

  3. Sets appropriate permissions (600) on the authorized_keys file to ensure it can only be read and written by the owner.

If the authorized_keys file already exists, it will simply be appended with the new key.

Once this is done, future connections to the server can be made using the same SSH command, but now the authentication will use the public key added to authorized_keys:

ssh name@server_address

Manual Copying

Some hosting platforms offer server management through alternative interfaces, such as a web-based control panel. In these cases, there is usually an option to manually add a public key to the server. The web interface might even simulate a terminal for interacting with the server.

Regardless of the method, the remote host must contain a file named ~/.ssh/authorized_keys, which lists all authorized public keys.

Simply copy the client’s public key (found in ~/.ssh/id_rsa.pub by default) into this file.

If the key pair was generated using a graphical application (typically PuTTY on Windows), you should copy the public key directly from the application and add it to the existing content in authorized_keys.

Connecting to a Server

To connect to a remote server on a Linux operating system, enter the following command in the terminal:

ssh name@server_address

Alternatively, if the local username is identical to the remote username, you can shorten the command to:

ssh server_address

The system will then prompt you to enter the password. Type it and press Enter. Note that the terminal will not display the password as you type it.

Just like with the ssh-copy-id command, you can explicitly specify the port when connecting to a remote server:

ssh client@server_address -p 8129

Once connected, you will have control over the remote machine via the terminal; any command you enter will be executed on the server side.

Conclusion

Today, SSH is one of the most widely used protocols in development and system administration. Therefore, having a basic understanding of its operation is crucial.

This article aimed to provide an overview of SSH connections, briefly explain the encryption algorithms (RSA, DSA, ECDSA, and EdDSA), and demonstrate how public and private key pairs can be used to establish secure connections with a personal server, ensuring that exchanged messages remain inaccessible to third parties.

We covered the primary commands for UNIX-like operating systems that allow users to generate key pairs and grant clients SSH access by copying the public key to the server, enabling secure connections.

Linux Servers SSH
30.01.2025
Reading time: 11 min

Similar

Linux

Creating Symbolic Links in Linux: A Step-by-Step Tutorial

Symlinks, also known as symbolic links, are like shortcuts in the Linux world. They allow you to create a new name (or link) that points to another file, directory, or any object within the file system. Their primary advantage lies in reducing redundancy by avoiding the need for multiple copies of the same file. When you have a symlink, changes made to the original file reflect across all its symbolic links. This eliminates the hassle of updating numerous copies individually. Additionally, symlinks offer a flexible way to manage access permissions. For instance, different users with directories pointing to subsets of files can limit visibility beyond what standard file system permissions allow. In essence, symlinks are indispensable for efficient file management and organization, streamlining updates and access control in complex systems. Prerequisites To follow this tutorial, you will need: A cloud server, virtual machine or computer running a Linux operating system. On Hostman, you can deploy a server with Ubuntu, CentOS or Debian in under a minute. Creating Symbolic Links with the ln Command The ln command is used to create symbolic links in Linux. Follow these steps: Open a terminal window. Navigate to the directory where you want to create the symbolic link. Use the following command syntax to create a symlink: ln -s /path/to/source /path/to/symlink Replace /path/to/source with the actual path of the file or directory you want to link, and /path/to/symlink with the desired name/location of the symlink. Understanding the ln Command Options The ln command offers various options to customize symlink creation:  -s: Creates a symbolic link.  -f: Overwrites an existing symlink.  -n: Treats symlink targets as normal files. Explore these options based on your linking needs. Creating Symbolic Links to Files To create a symlink to a file, use the ln command with the -s option. Here's an example of how you can create a symbolic link to a file using the ln command. The command below creates a symbolic link named symlink_file in the current directory, pointing to the file /path/to/file: ln -s /path/to/file /path/to/symlink_file Replace /path/to/file with the actual file path and /path/to/symlink_file with the desired symlink name. In this example, the file path is absolute. You can also create a symbolic link with a relative path. However, keep in mind that for the symlink to work correctly, anything accessing it must first set the correct working directory, or the link may appear broken. Creating Symbolic Links to Directories You can use the ln command to create a symbolic link that points to a directory. For instance, the command below creates a symbolic link called symlink_directory in the current directory, which points to the directory /path/to/directory: ln -s /path/to/directory /path/to/symlink_directory This command creates a symbolic link named symlink_directory in your current location, linking it to the /path/to/directory directory. Forcefully overwrite a symbolic link You can use the -f flag with the ln command. For example, if the path in a symlink is incorrect due to a typo or if the target has moved, you can update the link like this: ln -sf /path/to/new-reference-dir symlink_directory Using the -f flag ensures that the old symlink's contents are replaced with the new target. It also automatically removes any conflicting files or symlinks if there's a conflict. If you attempt to create a symlink without the -f flag and the symlink name is already in use, the command will fail. Verifying Symbolic Links You can display the contents of a symlink using the ls -l command in Linux: ls -l symlink_directory The output will show the symlink and its target: symlink_file -> /path/to/reference_file Here, symlink_file is the name of the symlink, and it points to the file /path/to/reference_file. ls -l /path/to/symlink The output will show the symlink and its target. Symbolic Link Best Practices Use descriptive names for symbolic links. Avoid circular links to prevent system confusion. Update symlinks if the target's location changes. Use Cases for Symbolic Links Managing Configuration Files: Linking configuration files across systems. Version Control: Symbolic linking common libraries for development projects. Data Backup: Creating symbolic links to backup directories. Potential Pitfalls and Troubleshooting Permission Issues: Ensure proper permissions for source and symlink. Broken Links: Update symlinks if target files are moved or deleted. Cross-Filesystem Links: Symlinks may not work across different filesystems. Conclusion Symlinks are valuable for streamlining file management and system upkeep. They simplify updates across multiple applications sharing a common file, reducing maintenance complexity. They also offer an alternative to directories like /etc, often requiring root access for file modifications. Developers find symlinks useful for transitioning between local testing files and production versions seamlessly. By following this tutorial, you've mastered the art of creating symbolic links in Linux. Leverage symlinks for efficient file management and customization. By the way, with Hostman, you can run your workloads on efficient NL VPS that support low latency for EU-based users. Check this out, we have plenty of budget VPS hosting options for your projects. Frequently Asked Questions (FAQ) How do you create a symbolic link in Linux?  Use the ln command with the -s flag. The syntax is ln -s [path_to_target] [path_to_link]. For example: ln -s /var/www/html/mysite ~/mysite-shortcut. What is an example of a symlink?  A desktop shortcut is the most common example. It is a small file that points to a program or document stored elsewhere on your drive, allowing you to open it without moving the original file. How do I find symbolic links in Ubuntu?  To see links in your current directory, run ls -la and look for files marked with an l permission (e.g., lrwxrwxrwx). To search for all symlinks in a directory and its subfolders, use find . -type l. How do I remove a symbolic link?  You can remove a symlink just like a regular file using rm [link_name] or unlink [link_name]. This deletes the link but leaves the original file untouched. What is the difference between a hard link and a symbolic (soft) link?  A symbolic link points to the location of a file (like a shortcut). If the original file is deleted, the link breaks. A hard link points to the actual data on the disk; even if you delete the original file name, the data remains accessible through the hard link.
19 January 2026 · 6 min to read
Linux

Linux Keyboard Shortcuts: Top Combinations for Users

Keyboard shortcuts in Linux are a great tool that can help you work more efficiently. Instead of using the mouse and navigating the menus, you can often press a couple of buttons to get you to the same result much quicker. Linux operating systems support a wide range of these shortcuts, or hotkeys. It’s important to note that each OS can have specific hotkeys that might not work in other distributions. However, you can fix that as users can add new or modify existing combinations in their system settings. Choose your server now! In this article, we will cover universal key combinations that are universal across different desktop environments. Most of the Linux hotkeys we examine are focused on working with the terminal. The commands in this article sometimes use the Super key, which corresponds to the Windows key in Windows OS or the Cmd key in macOS. For example, the shortcut to switch keyboard layouts Super + Space in Linux is similar to Windows + Space or Cmd + Space. Basic Linux Shortcuts Let’s start with basic general-purpose shortcuts. They help perform repetitive tasks more quickly. Alt + Tab or Super + Tab: Switches between windows. Similar to the function in Windows and other OSes. Super + Space: Switches between multiple keyboard layouts. Super + A: Opens the applications menu (usually located in the bottom left corner). F2: Used to rename files. Navigate to the file, click it once, then press F2 to rename. Ctrl + Alt + T: One of the most important and popular Linux shortcuts that opens the terminal window. Alt + F2: Opens a command prompt window in the center of the screen, where you can run a command or open a program. Super + D: Minimizes all windows to show the desktop. Ctrl + Alt + Del: Brings up a prompt with “Cancel” and “Log Out” options. The system logs out automatically if no selection is made within 60 seconds. These combinations help any specialist work more efficiently in Linux. But let’s move on to the more useful terminal-related hotkeys. Linux Terminal Shortcuts The terminal in Linux is the primary tool for interacting with the command shell. Below are terminal hotkeys that will help you work more efficiently. Terminal Window Management These shortcuts help open, switch, and close terminal tabs and windows quickly: Ctrl + Shift + Q: Completely closes the terminal window. Ctrl + Shift + T: Opens a new terminal tab. Ctrl + Shift + W: Closes the current terminal tab (or window if only one tab is open). Ctrl + Shift + D: Detaches the terminal tab into a separate window. Ctrl + PgUp / PgDown: Switches between terminal tabs (previous/next). Cursor Movement in a Line Linux users primarily use the keyboard in the terminal. To avoid switching to the mouse, here are some shortcuts for faster cursor navigation: Ctrl + A (or Home): Moves the cursor to the beginning of the line. Ctrl + E (or End): Moves the cursor to the end of the line. Ctrl + XX: Quickly moves the cursor to the beginning of the line; using it again returns it to the original position. Ctrl + → / ← or Alt + F / B: The first pair moves the cursor one word forward or backward. The second pair does the same using the Alt key. Input and Editing In addition to quickly moving the cursor along the line, you can also simplify input and editing of commands.  TAB: One of the main hotkeys in the Linux terminal, used for auto-completing commands or file paths. Pressing once completes the command; pressing twice suggests multiple completion options if available. Ctrl + T: Swaps the last two characters before the cursor. Alt + T: Similar to the previous shortcut but swaps the last two words before the cursor. Alt + Backspace: Deletes the word before the cursor. Alt + D: Deletes all characters after the cursor up to the next space. Alt + U / Alt + L: The first changes all characters to the right of the cursor to uppercase; the second to lowercase. Clipboard Operations These shortcuts allow interaction with the clipboard in the terminal: copying, cutting, or pasting parts of a line or the entire line. Ctrl + W: Deletes the word before the cursor. Ctrl + U: Deletes everything from the cursor to the beginning of the line. Ctrl + K: Deletes everything from the cursor to the end of the line. Ctrl + Y: Pastes the last deleted text from the clipboard using one of the three commands above. Command History Navigation Hotkeys also help interact with the command history in the terminal. This is useful when searching for previously used commands. To view the list of executed commands, use: history To quickly find and execute a previously used command, use the shortcuts below: Ctrl + R: Opens a search prompt to find a previously used command. Press Enter to run it, or Esc to edit or exit. Ctrl + O: Executes the command found using the shortcut above. Alt + <: Loads the first command from the command history. Screen Output Management The following shortcuts control the amount of information displayed in the terminal window and help focus on specific data even during a running process. Ctrl + C: Sends the SIGINT signal to the active process, immediately interrupting it. Ctrl + D: An alternative to exit, used to close the terminal. Often used in SSH sessions to disconnect from a remote host. Ctrl + Z: Suspends the active process and sends it to the background. Use the fg command to bring it back. Use jobs to list background processes. Ctrl + L: An alternative to the clear command, clears the terminal screen. Ctrl + S / Ctrl + Q: Ctrl + S pauses the terminal output; Ctrl + Q resumes it. Useful for stopping the screen output temporarily to examine or copy information. Adding and Modifying Hotkeys A Linux user may find that some combinations do not work or are missing entirely. Hotkeys may differ depending on the distribution as each system includes a default list of predefined shortcuts. However, in most Linux environments, users can create new shortcuts or modify existing ones.  Use Super + A to open the application menu. Use the search bar to find and open Settings. In the opened window, find and go to the Devices tab. Go to the Keyboard section. On the right side, a list of default hotkeys will appear. Click on any command to open the editing window and assign a new shortcut. If the desired command is not listed, you can add a custom one by clicking the + at the bottom. Enter its name, the command to execute, and the key combination. Choose your server now! Conclusion This article reviewed the main Linux hotkeys that simplify and speed up user workflow. It’s important to note that this is not a complete list. In addition to those listed, there are other combinations that cover different functionalities in Linux distributions. And if you’re looking for a reliable, high-performance, and budget-friendly solution for your workflows, Hostman has you covered with Linux VPS Hosting options, including Debian VPS, Ubuntu VPS, and VPS CentOS. Frequently Asked Questions (FAQ) What are the common shortcut keys for Linux?  While they vary by desktop environment (GNOME, KDE, etc.), standard global shortcuts include: Ctrl+Alt+T: Open a new Terminal window. Alt+Tab: Switch between open applications. Super Key (Windows Key): Open the Activities overview or Application menu. Alt+F4: Close the current window. What are the Linux shortcut keys for the terminal?  Terminal shortcuts differ from standard text editors. Key commands include: Ctrl+Shift+C / V: Copy and Paste text (standard Ctrl+C/V won't work). Ctrl+C: Interrupt (kill) the currently running process. Ctrl+L: Clear the terminal screen. Ctrl+A / Ctrl+E: Jump the cursor to the start or end of the line. How to set keyboard shortcuts in Linux?  Open your system Settings and select Keyboard. Scroll to the "Keyboard Shortcuts" section (sometimes under "View and Customize Shortcuts"). Here you can modify existing keys or add a custom shortcut by defining a command and pressing the desired key combination. How to use shortcuts on Linux?  Simply press the modifier keys (like Ctrl, Alt, or Super) and the action key simultaneously. Note that Linux shortcuts are case-sensitive regarding the Shift key; for example, Ctrl+c is different from Ctrl+Shift+C.
16 January 2026 · 7 min to read
Linux

How to Mount an SMB Share in Linux

The Server Message Block (SMB) protocol facilitates network file sharing, allowing applications to read and write to files and request services from server programs. This protocol is pivotal for seamless communication between different devices in a network, particularly in mixed OS environments like Windows and Linux. Users can access files on a Windows server or any SMB-enabled device straight from their Linux workstation by mounting an SMB share. In order to ensure seamless file sharing and network connectivity, this tutorial will walk you through the process of mounting an SMB share on Linux. Linux terminal is important tool to install SMB Share in Linux And if you’re looking for a reliable, high-performance, and budget-friendly solution for your workflows, Hostman has you covered with Linux VPS Hosting options, including Debian VPS, Ubuntu VPS, and VPS CentOS. Choose your server now! Prerequisites for Mounting SMB Shares Before mounting an SMB share, ensure the following prerequisites are met: A Linux system, such as a Hostman cheap cloud server, with root or sudo privileges. The cifs-utils package installed on your Linux system. Access credentials (username and password) for the SMB share. Network connectivity between your Linux system and the SMB server. Installing Necessary Packages The cifs-utils package is essential for mounting SMB shares on Linux. Additionally, the psmisc package provides the fuser command, which helps manage and monitor file usage. Update Package List and Upgrade System First, update your package list and upgrade your system: sudo apt update Install cifs-utils and psmisc Install the necessary packages: sudo apt install cifs-utils psmisc Verify Installation Verify the installation of cifs-utils and availability of the fuser command: mount -t cifsfuser Finding SMB Share Details Get the SMB share information, such as the share name and the server name or IP address. You may need to examine the server setup or speak with your network administrator. Example: Server: smbserver.example.com Share: sharedfolder Mounting SMB Shares Using the mount Command To mount the SMB share, use the mount command with the -t cifs option, specifying the SMB protocol. Create a directory to serve as the mount point: sudo mkdir /mnt/smb_share Mount the SMB share using the following command: sudo mount -t cifs -o username=your_username,password=your_password //192.0.2.17/SharedFiles /mnt/smb_share Replace your_username and your_password with your actual username and password. Ensure /mnt/smb_share is an existing directory. Verifying the Mount To confirm that the SMB share is successfully mounted, use the mount command: mount -t cifs Navigate to the mount point and list the files: cd /mnt/smb_sharels Creating a Credentials File Make a credentials file so you don't have to enter your credentials every time. This file has to be guarded and hidden. Use a text editor to create the file: nano ~/.smbcredentials Add the following content, replacing with your actual credentials: username=your_usernamepassword=your_password Set appropriate permissions for the file: sudo chown your_username: ~/.smbcredentialssudo chmod 600 ~/.smbcredentials Mount Using the Credentials File Mount the SMB share using the credentials file: sudo mount -t cifs -o credentials=~/.smbcredentials //192.168.2.12/SharedFiles /mnt/smb_share Quick example of how SMB Shared is mounted in Linux terminal Automating SMB Share Mounts To automate the mounting process, add an entry to the /etc/fstab file. This will ensure the SMB share is mounted at boot. 1. Open /etc/fstab for editing: sudo nano /etc/fstab 2. Add the following line: //smbserver.example.com/sharedfolder /mnt/smbshare cifs username=johndoe,password=securepassword,iocharset=utf8,sec=ntlm 0 0 3. Save and close the file. 4. Test the fstab entry: sudo mount -a Ensure no errors are displayed. Troubleshooting Common Issues Permission Denied Check your credentials and permissions on the SMB server. No Such File or Directory Ensure the server IP, share path, and mount point are correct. Mount Error 13 = Permission Denied Double-check your username and password. Mount Error 112 = Host is Down Verify network connectivity and server availability. Unmounting an SMB Share To unmount the SMB share, use the umount command followed by the mount point: sudo umount /mnt/smb_share Choose your server now! Conclusion Mounting an SMB share in Linux is a straightforward process that enhances file sharing capabilities across different operating systems. By following this tutorial, you can efficiently set up and troubleshoot SMB share mounts, facilitating seamless network communication and file access. Don't forget to check how to configure server image on Lunix! Frequently Asked Questions (FAQ) How do I mount an SMB share in Linux manually?  Use the mount command with the cifs type. The syntax is: sudo mount -t cifs -o username=[user] //server/share /mnt/local_mountpoint You will be prompted to enter the password for the SMB user. How do I mount a Samba share in Linux permanently?  To mount a share automatically at boot, add an entry to your /etc/fstab file. It generally looks like this: //server/share /mnt/point cifs username=user,password=pass 0 0 Note: For security, it is better to use a credentials file instead of putting the password directly in fstab. How do I mount an SMB share in CentOS/RHEL?  First, ensure the necessary utilities are installed by running sudo dnf install cifs-utils. Once installed, the mount process is the same as other distributions: sudo mount -t cifs -o username=[user] //server/share /mnt/point What do I do if I get a "wrong fs type" error?  This usually means the helper utilities are missing. On Ubuntu/Debian, run sudo apt install cifs-utils. On CentOS/Fedora, run sudo dnf install cifs-utils. How do I unmount the share when I'm done?  Use the umount command followed by the local directory: sudo umount /mnt/local_mountpoint
14 January 2026 · 5 min to read

Do you have questions,
comments, or concerns?

Our professionals are available to assist you at any moment,
whether you need help or are just unsure of where to start.
Email us
Hostman's Support