{"id":7394,"date":"2023-06-27T06:26:52","date_gmt":"2023-06-27T06:26:52","guid":{"rendered":"https:\/\/www.infinitivehost.com\/knowledge-base\/?p=7394"},"modified":"2023-06-27T09:28:58","modified_gmt":"2023-06-27T09:28:58","slug":"how-to-login-aws-linux-instance-using-pem-key","status":"publish","type":"post","link":"https:\/\/www.infinitivehost.com\/knowledge-base\/how-to-login-aws-linux-instance-using-pem-key\/","title":{"rendered":"How To login AWS Linux Instance Using PEM Key On Linux Systems?"},"content":{"rendered":"<div class='epvc-post-count'><span class='epvc-eye'><\/span>  <span class=\"epvc-count\"> 2,060<\/span><span class='epvc-label'> Views<\/span><\/div>\n<p>Privacy Enhanced Mail (PEM) is the acronym for PEM. The PEM format is commonly used to represent&nbsp; certificate requests, certificate chains, and private keys.<\/p>\n\n\n\n<p>PEM\u2013formatted files are typically saved as.pem files, however this isn\u2019t necessary. AWS does not provide tools for manipulating PEM files or any other certificate format.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How To Login AWS Linux Server Using PEM Key On Linux<\/strong>&nbsp;<strong>System<\/strong><\/h2>\n\n\n\n<p>After the launching of instance, an individual can connect to it and utilise it in the same way in all devices.<\/p>\n\n\n\n<p>The following instructions will help to walk through the process of connecting to instance via an SSH client. In case you encounter an error while attempting to connect to your instance, see Troubleshoot your instance connection. Additional connection possibilities are described below.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Connect to your aws Linux instance using SSH client.<\/strong><\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Open your Terminal:<\/li>\n\n\n\n<li>Please specify the file path of private key (.pem).<\/li>\n\n\n\n<li>Change permission to 600.<\/li>\n<\/ol>\n\n\n\n<pre class=\"wp-block-preformatted has-pale-cyan-blue-background-color has-background\"> &nbsp;&nbsp;&nbsp;chmod 600 xxx.pem<\/pre>\n\n\n\n<p>4. Now connect to aws instance with public_ip or Public_DNS name<\/p>\n\n\n\n<pre class=\"wp-block-preformatted has-pale-cyan-blue-background-color has-background\">ssh&nbsp; &nbsp; -i file path (.pem) <a href=\"about:blank\">user-name@public_ip<\/a> or Hostname.<\/pre>\n\n\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"718\" height=\"190\" src=\"https:\/\/www.infinitivehost.com\/knowledge-base\/wp-content\/uploads\/2023\/06\/awskbimg1.png\" alt=\"\" class=\"wp-image-7397\" srcset=\"https:\/\/www.infinitivehost.com\/knowledge-base\/wp-content\/uploads\/2023\/06\/awskbimg1.png 718w, https:\/\/www.infinitivehost.com\/knowledge-base\/wp-content\/uploads\/2023\/06\/awskbimg1-300x79.png 300w\" sizes=\"(max-width: 718px) 100vw, 718px\" \/><\/figure>\n\n\n\n<ol class=\"wp-block-list\" start=\"5\">\n<li>Click Enter:<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"603\" height=\"277\" src=\"https:\/\/www.infinitivehost.com\/knowledge-base\/wp-content\/uploads\/2023\/06\/awskbimg2.png\" alt=\"\" class=\"wp-image-7398\" srcset=\"https:\/\/www.infinitivehost.com\/knowledge-base\/wp-content\/uploads\/2023\/06\/awskbimg2.png 603w, https:\/\/www.infinitivehost.com\/knowledge-base\/wp-content\/uploads\/2023\/06\/awskbimg2-300x138.png 300w\" sizes=\"(max-width: 603px) 100vw, 603px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>2,060 Views Privacy Enhanced Mail (PEM) is the acronym for PEM. The PEM format is commonly used to represent&nbsp; certificate requests, certificate chains, and private keys. PEM\u2013formatted files are typically saved as.pem files, however this isn\u2019t necessary. AWS does not provide tools for manipulating PEM files or any other certificate format.&nbsp; How To Login AWS [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[160],"tags":[],"class_list":["post-7394","post","type-post","status-publish","format-standard","hentry","category-aws"],"_links":{"self":[{"href":"https:\/\/www.infinitivehost.com\/knowledge-base\/wp-json\/wp\/v2\/posts\/7394","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infinitivehost.com\/knowledge-base\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infinitivehost.com\/knowledge-base\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infinitivehost.com\/knowledge-base\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infinitivehost.com\/knowledge-base\/wp-json\/wp\/v2\/comments?post=7394"}],"version-history":[{"count":2,"href":"https:\/\/www.infinitivehost.com\/knowledge-base\/wp-json\/wp\/v2\/posts\/7394\/revisions"}],"predecessor-version":[{"id":7402,"href":"https:\/\/www.infinitivehost.com\/knowledge-base\/wp-json\/wp\/v2\/posts\/7394\/revisions\/7402"}],"wp:attachment":[{"href":"https:\/\/www.infinitivehost.com\/knowledge-base\/wp-json\/wp\/v2\/media?parent=7394"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infinitivehost.com\/knowledge-base\/wp-json\/wp\/v2\/categories?post=7394"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infinitivehost.com\/knowledge-base\/wp-json\/wp\/v2\/tags?post=7394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}