Stacksync Documentation
  • What is Stacksync?
  • 🚀 Start here
    • Quick start
    • Community
  • 💡Guides
    • Modify Salesforce Data in Postgres
    • 🔄Two-way sync Salesforce and Postgres
      • Create a Postgres Database with Supabase (free forever)
      • Create a Salesforce Developer instance (free forever)
      • Create a Sync between Supabase Postgres and Salesforce
    • ⚡Event Triggers
    • 🔣Add a new custom field to an existing sync
  • 🔗 Connectors
    • Salesforce
      • Authorize Salesforce
        • ⚙️Enable API Access in Salesforce
    • Postgres
      • Authorize Postgres
        • Supabase
        • Cloud SQL
        • Digital Ocean
        • Heroku
        • Amazon Lightsail
        • Amazon RDS
          • Ensuring Secure RDS Connections with SSL Certificate
        • Basedash
        • Render
        • Retool
      • Snippets
      • Required Permissions
    • BigQuery
      • Authorize BigQuery
    • HubSpot
      • Authorize HubSpot
      • Associations
      • HubDB
      • Attachments
    • MotherDuck
    • Supabase
    • Snowflake
      • Authorize Snowflake
    • Attio
      • Authorize Attio
    • Pipedrive
      • Authorize Pipedrive
    • Front
      • Authorize Front
    • Zoho
      • Authorize Zoho
    • MySQL
      • Authorize MySQL
        • Ensure Secure RDS connection with SSL Certificate
        • Access Private RDS database through SSH Tunnel
    • MariaDB
      • Authorize Mariadb
        • Ensure Secure RDS connection with SSL Certificate
        • Access Private RDS database through SSH Tunnel
    • Netsuite
      • Authorize Netsuite
    • MongoDB
    • Shopify
      • Authorize Shopify
    • Zendesk
      • Authorize Zendesk
    • 🤖Setup options
      • 🏳️IP Whitelisting
      • 🚰Manage API rate limits
      • 🌍Choose data processing region
      • SSH Tunneling
        • Access private ASW RDS instance through Jumpbox
        • Azure Jumpbox
        • Windows Server 2022 Jumpbox
        • Windows Server 2025 Jumpbox
        • GCP Jumpbox
  • 📦 API Proxy
    • Salesforce
    • HubSpot
    • Attio
    • Pipedrive
  • Features
    • Two-way sync
    • Event triggers
      • Webhook (HTTP call)
      • Database Query
    • Update Sync configuration
    • Associations support
    • Manage workspace users
    • Manage API rate limits
    • Delete Record Protection
    • Issues dashboard
    • Custom sync frequencies
    • Other features
      • Sync statistics
      • Monitoring
    • 🔐Security
      • SSO & SCIM
        • Azure Entra ID
        • OKTA
      • MFA
  • Workflows
    • Workflows Quick Start
    • Features
      • Variables and Secrets
        • Variable replacement
  • Legal
    • Terms of Service and Conditions (TC)
    • Privacy Notice
    • Service Consumption Tables
    • Global Employee and Applicant Privacy Notice
    • Acceptable Use Policy (AUP)
    • Data Processing Addendum (DPA)
    • Referral Programme Policy
    • Terms and Conditions for Stacksync Content Creator Programme
    • Stacksync Certified Partner Program Terms and Conditions
  • Security
    • Overview - Security
    • Subprocessors
    • EU Data Protection
  • Others
    • Content Creator Guidelines
Powered by GitBook
On this page
  • I. Enable Open SHH
  • II. Grant your Windows user access to OpenSSH Server
  • III. Set Up OpenSSH Server
  • IV. Upload the Public SSH key of the client
  • V. Open Firewall
  • VI. Test
  • Troubleshooting of common errors
  1. 🔗 Connectors
  2. Setup options
  3. SSH Tunneling

Windows Server 2025 Jumpbox

This guide is to connect to a Windows server through SSH (11min setup required).

PreviousWindows Server 2022 JumpboxNextGCP Jumpbox

Last updated 4 months ago

I. Enable Open SHH

On the Windows server, open the Server Manager app, and enable Remote SSH Access.

II. Grant your Windows user access to OpenSSH Server

  1. Open Computer Management application.

  2. Go into Local Users and Groups > Groups.

  3. Click on OpenSSH Users.

  4. Add your Windows user to the list of members for the group OpenSSH Users.

III. Set Up OpenSSH Server

  1. Open a terminal with Administrator role.

  2. Open the OpenSSH Server config file by running: notepad "C:\ProgramData\ssh\sshd_config"

  3. Uncomment PubkeyAuthentication.

  4. Uncomment PasswordAuthentication and set it to no.

  5. Comment the 2 last lines of the file (Match Group Administrator).

  6. Save and quit the file. If you cannot save, you most certainly did not open the terminal as an Administrator, you need to open a new terminal with Administrator rights and redo the configuration changes done in this section.

  7. In the Computer Management window, go to Services and Applications > Services.

  8. Select the OpenSSH Server.

  9. Restart the OpenSSH Server.

IV. Upload the Public SSH key of the client

  1. Go in Users and go in the folder associated with the user you want to connect with.

  2. Create a new folder .ssh

  3. In this newly created folder, create an empty text file authorized_keys

  4. By default, text files are created with a .txt extension, we need to remove it.

    1. Click View in the header bar.

    2. Tick the checkbox File name extensions .

    3. The .txt file extension should now be visible.

    4. Rename the file to remove the file extension. You can safely ignore the warning.

  5. Add the PUBLIC SSH key of the server that you want to grant access to this Windows server we are currently configuring. The public key is of the form: ssh-<encryption_algorithm> <key> .

V. Open Firewall

If you are connected from outside the private network where the Windows server is locted, you need to open the firewall.

  1. Open app 'Windows Defender Firewall with Advanced Security'.

  2. In the Inbound Rules, click on 'OpenSSH Server'.

  3. In the Advanced section, select all the checkboxes.

VI. Test

Try connecting through SSH to the windows instance we just setup:

ssh -i <path_to_ssh_private_key_of_client> <ssh_user>@<windows_server_public_ip>

where:

  • -i <path_to_ssh_private_key_of_client>: Specifies the private key file for authentication of the client, not of the windows machine. The private key file should be readable and writable only by its owner and should be of the form:

-----BEGIN PRIVATE KEY-----
          ...
          ...
-----END PRIVATE KEY-----
  • ssh_user : the Windows User for which you uploaded the client public key. In the screenshots above it is 'alexis'.

  • <windows_server_public_ip>: The public IP address of the Windows server.

Troubleshooting of common errors

Permissions 0644 for <path_to_ssh_private_key_of_client> are too open. It is required that your private key files are NOT accessible by others. This private key will be ignored.

-> You need to let only the owner of the file read and write to that file. Run this: chmod 600 <path_to_ssh_private_key_of_client>

'export' is not recognized as an internal or external command, operable program or batch file. -> This is an error due to your client terminal, try using the default terminal of the client machine. This error typically happen when using Warp as terminal.

Permission denied (publickey,keyboard-interactive).

-> You most certainly missed one of the above steps of that tutorial, or the public ssh key uploaded on the Windows server does not correspond to the private ssh key of the client.

timeout error.

-> The Windows server is not listening to the client IP and the port you are trying to connect to (SSH default port is 22). Make sure you whitelisted the client IP.

You should now have been able to access this Windows server through SSH If you are blocked or have any question, feel free to reach out to us at hello@stacksync.com we're happy to help!

🤖
🎉