How to Access a Linux Virtual Machine via SSH from Windows


How to Access a Linux Virtual Machine via SSH from Windows

There are various reasons you may wish to access the backend of a Linux virtual machine. In regards to a Matillion server, which is hosted on a Linux operating system, this could be for a variety of reasons, including but not limited to:

  • Retrieving historic logs
  • Running updates
  • Setting up SSH keys for Matillion to leverage when connecting to other platforms
  • Working with Matillion Support if there are issues with your Matillion application


  • Administrator credentials to your Linux virtual machine. This could be either:
    • A username and password
    • A username and private SSH key
  • The OpenSSH Client optional service must be enabled on your machine, and OpenSSH must be added to your PATH environment variable. You can read how to do that here.

Logging into a Linux Virtual Machine via SSH

Logging into a Linux Virtual Machine via SSH with a Username and Password

Using the console or command line, use the ssh user@host command to access the server. You will be prompted for your password:

That’s all there is to it really, so short and sweet!

Logging into a Linux Virtual Machine via SSH with a Username and SSH Key

1. Using the console or command line, use the ssh user@host -i path/to/private/key command to access the server. If you log in successfully, skip to the next section. Otherwise, it is likely you were presented with an error stating that your private SSH key is too open, like in the following screenshot:

2. To avoid this error, the private key must be stored securely so that only your user is able to access it. We must modify the properties of the private key file so that no other user can access it. Begin by right-clicking on the private key file and opening the properties:

3. On the Security tab, select Advanced:

4. If you are not already, change yourself to the owner of the file:

5. Disable the inheritance on the object and remove all inherited permissions:

6. Add yourself to the permitted users and grant yourself full control:

7. Apply the changes and click OK. You should now be able to return to the console and run the same ssh user@host -i path/to/private/key command to access the server:

So there were a few more steps involved to set up the appropriate security on the private SSH key, but once you have things set up, you can log in with this same single line of code when needed for a smooth experience.

More About the Author

Chris Hastie

Data Lead
Snowflake External Access: Trigger Matillion DPC Pipelines Recently, Snowflake released external access integrations into general availability. This allows Snowflake admins to create secure ...
Snowflake Network Rules: Restrict Access to Specific Private Endpoints In previous articles, we have discussed how to set up private connectivity with Snowflake for both Azure and AWS: Configure Azure ...

See more from this author →

InterWorks uses cookies to allow us to better understand how the site is used. By continuing to use this site, you consent to this policy. Review Policy OK


Interworks GmbH
Ratinger Straße 9
40213 Düsseldorf
Geschäftsführer: Mel Stephenson

Telefon: +49 (0)211 5408 5301

Amtsgericht Düsseldorf HRB 79752
UstldNr: DE 313 353 072


Love our blog? You should see our emails. Sign up for our newsletter!