Last updated: 2026-03-16

What is SSH (Secure Shell)?

Definition

SSH (Secure Shell) is a cryptographic network protocol that provides a secure, encrypted connection to your hosting server's command line. It allows developers and administrators to execute commands, manage files, configure software, and troubleshoot issues directly on the server—all through an encrypted tunnel that prevents eavesdropping.

Why It Matters

  • Enables direct, secure server access for administrators
  • Required for advanced server management tasks
  • Facilitates Git deployment and version control
  • Allows running scripts and automating tasks
  • Essential for developers working with modern frameworks

How It Works

SSH creates an encrypted connection between your computer and the server using public-key cryptography. You use an SSH client (terminal on Mac/Linux, PuTTY on Windows) to connect by specifying the server's hostname, username, and port (default 22). Authentication can use passwords or SSH keys (more secure). Once connected, you have a command-line interface to the server, where you can run any command the server supports—navigate directories, edit files, restart services, check logs, and more.

Pros & Cons

Advantages

  • Fully encrypted connection for security
  • Complete server control via command line
  • Key-based authentication is extremely secure
  • Enables Git, WP-CLI, and modern workflows
  • Faster than GUI-based management for many tasks

Disadvantages

  • Requires command-line knowledge
  • Not available on all hosting plans
  • Mistakes can be dangerous (no undo button)
  • Key management requires understanding
  • Intimidating for beginners

Common Misconceptions

  • !SSH is only for system administrators (Developers use it daily)
  • !SSH access means root access (Hosts often provide limited SSH)
  • !SSH is insecure (It's one of the most secure protocols available)
  • !You need SSH for basic website management (Control panels handle most tasks)

Do You Need SSH (Secure Shell)? Checklist

Consider ssh (secure shell) if any of these apply to you:

  • SSH access is available on your hosting plan
  • You're using SSH keys instead of passwords
  • Your SSH client is configured correctly
  • You understand basic command-line navigation
  • Two-factor authentication is enabled if available
  • You know which commands are safe to run

Recommended Hosts for SSH (Secure Shell)

Hosting.com

Full SSH access on all plans including shared

Read Review

Kinsta

SSH access with easy key management in MyKinsta

Read Review

SiteGround

SSH access with intuitive key management

Read Review

Frequently Asked Questions

How do I connect via SSH?
On Mac/Linux, open Terminal and type: ssh [email protected] -p 22. On Windows, use PuTTY or Windows Terminal. You'll need your hostname, username, password or SSH key, and port number. Your host provides these details in your control panel or welcome email.
What is the difference between SSH and SFTP?
Both use the SSH protocol for encryption. SSH gives you command-line access to run commands on the server. SFTP provides secure file transfer capabilities over the same encrypted connection. SFTP is specifically for moving files; SSH is for executing commands.
What are SSH keys?
SSH keys are a pair of cryptographic keys (public and private) used for authentication instead of passwords. The public key goes on the server; the private key stays on your computer. Key-based authentication is more secure than passwords and enables passwordless login.
Is SSH available on shared hosting?
Not always. Many budget shared hosts disable SSH. Hosting.com, SiteGround, and Bluehost offer SSH on shared plans. VPS, cloud, and dedicated hosting almost always include SSH access. Check before purchasing if SSH is important to you.
What useful SSH commands should I know?
Essential commands: ls (list files), cd (change directory), cp/mv (copy/move), rm (delete—use carefully), nano/vim (edit files), wp (WP-CLI for WordPress), git (version control), top/htop (server resource usage), tail -f (watch log files in real-time).
Can I damage my site via SSH?
Yes. SSH gives powerful access—commands like rm -rf can permanently delete files without confirmation. Always backup before making changes. If unsure, test commands on a staging server first. Shared hosting SSH usually has restrictions preventing the most dangerous operations.
What is WP-CLI?
WP-CLI is the WordPress command-line interface, used via SSH. It lets you manage WordPress without a browser—update plugins (wp plugin update --all), manage users, import/export content, optimise databases, and much more. It's faster than the dashboard for bulk operations.