@Jelle G,
There is something completely wrong about this topic, in the sense that a lot of unnecessary steps are taken to (essentially) create a more vulnerable system.
First, with respect to Linux based SSH, note the following:
a) the root user is in principle a "passwordless" account, for the sake of security,
b) SSH access can be granted by means of
- an alternative account with a password, required to use the sudo prefix (or better: sudo -i, in order to prevent typing sudo before each command)
- an alternative account with a password and root privileges
- a root account with a password (which violates the principle, mentioned in point a)
- a root account with certificate based access
c) any provider of servers, granting certificate based SSH access, also provides
- the private key required to make the connection (this key is the secure password)
- an alternative account with a password and/or root priviliges
and in
both cases, one can make SFTP connections by using the private key (in any application) or by using the alternative account.
Second, if you have a FTP account that works, just
- upload data to an accessible folder
- move the data to desired destination folder, by accessing the server via SSH
and this will
not compromise security.
Third, if you fiddle with
- SSH config (read: sshd configuration files)
- root passwords (read: the command
passwd root)
- root privileges (read: root privileges assigned to any user, including the user with the alternative account mentioned in point b of the first point made)
you are in danger of locking yourself out of the system entirely OR creating a security blackhole (that malicious scripts and persons scan for and, afterwards, WILL use).
Fourth, why not asking the server provider where to download the private key required for getting SSH access? Saves a lot of trouble.
Fifth, always make sure that SSH access is blocked for all IPs, except your own private IP and other IPs that you trust (so, it often is the rule "allow, deny all others")
Sixth, I am not sure why you would want to make any changes to the roundcube directories.
Sure, it can be the case that you want to customize Roundcube, but any upgrade of Plesk Roundcube packages can imply that your customizations are lost.
Moreover, the default Roundcube config files are a little bit "picky", in the sense that customizations do not always work as expected.
In summary and conclusion, I would
recommend to keep the server as original as can be, in order to prevent system config customizations that can become troublesome.
Think about it a second, before letting the connection issues win over the security related considerations.
Regards.....