Enabling SSH agent forwarding in PuTTY enables authentication to additional SSH servers from a jump host without copying private keys onto that jump host. Multi-hop administration becomes simpler while keeping key material on the originating workstation.
PuTTY forwards agent-signing requests over the encrypted SSH connection to Pageant, the SSH agent included with the PuTTY suite on Windows, which holds decrypted keys in memory. The remote host receives only the results of cryptographic operations and never receives private key files.
Agent forwarding expands the trust boundary because processes on the remote host can attempt to use the forwarded agent while the session is open. Forwarding can also be blocked by server-side policy, so an enabled client checkbox does not guarantee a forwarded agent socket on the server.
Pageant must remain running for forwarded authentication to work.
An encrypted key prompts for a passphrase before loading.
Agent forwarding exposes the local agent to the remote host; enable only on trusted servers and close the session when finished.
Keeping Attempt authentication using Pageant enabled allows PuTTY to use keys loaded in Pageant automatically.
Accepting an unexpected fingerprint can indicate a man-in-the-middle attack or a replaced server key.
$ echo $SSH_AUTH_SOCK /tmp/ssh-9tQJvYwJ7F/agent.2714
An empty value indicates agent forwarding is disabled or rejected by the server.
$ ssh user@internal-host Last login: Tue Dec 16 08:41:12 2025 from 10.0.0.10 $
Use plain ssh user@host for a single hop; add ssh -A only when forwarding the agent to another hop is required.
Unloading keys reduces exposure if the workstation is left unattended.