Overview
The Access & Security resources in the Dashboard cover three categories: Key Pairs for SSH access to instances, Security Groups for network-level firewall rules, and Application Credentials for non-interactive API authentication. All three are accessible under Project → Compute and Project → Network.Prerequisites
memberrole in the active project- Key pair private keys must be saved at creation — they cannot be retrieved later
Key Pairs
SSH key pairs provide cryptographic authentication to instances. The public key is injected into the instance at launch; you connect using the corresponding private key.Create a Key Pair
Name and generate
Enter a Key Pair Name (e.g.,
Click Create Key Pair.
my-laptop-key). Select Key Type:| Type | Algorithm | Use Case |
|---|---|---|
| SSH | RSA 2048 or Ed25519 | Standard SSH access |
| x509 | X.509 certificate | Certificate-based workflows |
Save the private key
The browser automatically downloads a Set correct permissions on the key file:
.pem file containing the private key.Save the private key file immediately — it is shown only once and cannot be retrieved from the Dashboard or API. Loss of the private key means loss of SSH access to any instance using this key pair.
Restrict key file permissions
Import an Existing Public Key
If you already have an SSH key pair, import just the public key:Use a Key Pair
When launching an instance, select the key pair in the Key Pair tab of the Launch Instance wizard. Then connect via SSH:Connect to instance via SSH
Security Groups
Security groups are virtual firewalls applied to instance network ports. Rules are stateful — return traffic for allowed connections is automatically permitted.Default Security Group
Every project has adefault security group that:
- Allows all egress (outbound) traffic
- Allows all ingress from instances in the same
defaultgroup - Blocks all other ingress by default
Create a Security Group
Create the group
Navigate to Project → Network → Security Groups and click Create Security Group. Enter a name and description.
Add ingress rules
Click Manage Rules → Add Rule:
| Rule | Port | Remote | Use Case |
|---|---|---|---|
SSH | 22/TCP | Your IP CIDR | Admin SSH access |
HTTP | 80/TCP | 0.0.0.0/0 | Public web server |
HTTPS | 443/TCP | 0.0.0.0/0 | Public HTTPS |
Custom TCP | 5432/TCP | App security group | Database access |
All ICMP | — | 0.0.0.0/0 | Ping/traceroute |
Common Security Group Patterns
Web Server (HTTP/HTTPS + SSH)
Web Server (HTTP/HTTPS + SSH)
| Direction | Protocol | Port | Remote |
|---|---|---|---|
| Ingress | TCP | 22 | Admin CIDR |
| Ingress | TCP | 80 | 0.0.0.0/0 |
| Ingress | TCP | 443 | 0.0.0.0/0 |
| Egress | All | All | 0.0.0.0/0 |
Database (Private Access Only)
Database (Private Access Only)
| Direction | Protocol | Port | Remote |
|---|---|---|---|
| Ingress | TCP | 3306 | app-tier security group |
| Ingress | TCP | 22 | Admin CIDR |
| Egress | All | All | 0.0.0.0/0 |
Jump Host / Bastion
Jump Host / Bastion
| Direction | Protocol | Port | Remote |
|---|---|---|---|
| Ingress | TCP | 22 | 0.0.0.0/0 (or corporate CIDR) |
| Egress | All | All | 0.0.0.0/0 |
Application Credentials
Application credentials allow scripts, CI/CD pipelines, and automation tools to authenticate to the API without using your personal password or MFA.Create Application Credentials
Open Application Credentials
Navigate to Identity → Application Credentials and click Create Application Credential.
Configure the credential
| Field | Description |
|---|---|
| Name | Descriptive name (e.g., terraform-prod, ci-backup-job) |
| Description | Optional |
| Secret | Leave blank to auto-generate a secure secret |
| Expiration Date/Time | Optional — set for temporary credentials |
| Roles | Restrict to a subset of your roles (optional) |
| Unrestricted | Allow creating/deleting further app credentials (use with caution) |
Next Steps
Identity & Access Management
Users, roles, projects, and multi-factor authentication
Application Credentials
Detailed guide to scoped application credentials and token exchange
Security Groups (Networking)
Advanced security group rules for compute instances
Multi-Factor Auth
Add TOTP-based MFA to your account