Economical Cloud Hosting Plans
India's Leading Cloud
Hosting Company
Knowledge Base

How Do I Access My Dedicated Server?

Windows users can access their dedicated server via the Remote Desktop while Linux users will connect through the SSH (Secure Shell).

Windows Servers:

Click on the Start button on your computer. Check and click on All Programs Menu. Select "Accessories" menu and then click on "Remote Desktop Connection". You will be asked to type your IP address of your server in the Computer field. Next, click on the Connect button.

You will be asked to type the Username(Administrator). Type the administrator password. You are logged into your dedicated server.

Linux Servers:

Linux users will connect via the SSH. Create an SSH key pair, keeping the public key for your resources and the private key to log in to the server via SSH. From the command prompt: you must type $ ssh(username)@ (IP address). Username in this context, is the name assigned to you by your host and the IP address is your servers IP address.

You will be asked for the password. It must be the same one that must have created. Type the password carefully as you cannot view the characters on your screen. If everything is correct, you are connected to your server.  All the information that you were asked to fill in earlier will be available in your User Account under the Information and Settings column.
USER is the user for which you are establishing an SSH connection. The Hostname will be the host/IP of the server that you are connecting to and the Port for the connection will be 18765. Press enter and you will successfully establish a connection to your dedicated server. You can see the last login information, the prompt etc.

Providing access to important officials is very important but itís equally important to limit access. You have already got the answer to¬†how to connect to a dedicated server¬†and¬†how to access dedicated server.¬†Now it turns to learn to whom the access must be granted.¬†
As you might be aware that every dedicated server has a root user. He or she is called the administrator access. For this one needs to change the root credentials. A root user is created that has the sole permission to the server. dedicated cloud connection needs for such strictness. Blocking the root user access through SSH (Secure Shell) will avoid ill practices of logging in. 
Periodic password change policy also keeps the server more secure and helps in maintaining the authenticity of the complete server environment. Making sure that users are logging in through trusted networks is another one method that keeps the data within the cloud more secure. 
CloudOYE is a leading cloud computing solutions on Cloud Server Hosting & Dedicated Servers Hosting. Call our technical experts at 1800 212 2022 or mail us at

Was this answer helpful? #4 #4

Related Questions

Reduce Your Current Cloud Cost


How to Ensure ROI from Cloud Computing

This whitepaper sets out details about various key performance indicators

Unleash New Boundaries With Cloud CDN

Tough competition in the online business has alerted CIOs across the globe.


Cloud Computing Demystified

It is a computing paradigm, wherein a huge cluster of systems are interconnected .

Download Now >

What is CloudOYE?

Join 100000 + IT pros on our updates
  • Cloud India
  • Cloud India
Cloud India