It appears there may be some confusion between two distinct key pairs involved in SSH/SFTP authentication.
Server Host Keys (SSH Keys section in Web Admin)
The first key pair establishes the server's identity. These are the SSH host keys, which are automatically generated by Buru SFTP Server during installation. In fact, multiple key pairs using different algorithms (such as RSA, ECDSA, and Ed25519) are created to support various client configurations. These private keys must be kept secure and are stored in the server's configuration directory. When a client connects, the server presents its public host key, allowing the client to verify it is communicating with the intended server and not an impostor.
User Authentication Keys
The second key pair establishes the user's identity. These keys should be generated on the client side, not on the server. The user creates a key pair using a tool such as ssh-keygen, PuTTYgen, or a similar utility. The private key remains securely stored on the client machine and should never be shared. The corresponding public key is then uploaded to the server and added to the user's authorized keys configuration (using Web Administration, for example). During authentication, the server challenges the client to prove possession of the private key without ever transmitting it.
TLDR: the server's host keys prove the server is who it claims to be, while the user's authentication keys prove the user is who they claim to be. Both are essential, but they serve fundamentally different purposes and should be managed accordingly.