get('admin_mail'); $baseurl = $this->get('baseurl'); $security_config = $this->get('security_config'); ?>
You can upload a new public key to your account from the home page.
Most objects that are known by SSH Key Authority are represented by icons:
Physical or virtual servers.
Accounts on servers (eg. root@myserver is a server account).
Users of SSH Key Authority.
Collections of users or server accounts.
Begin by browsing the server list. Click on the server that you need access to.
You should see a "request access" form, in which you will need to enter the name of the account on the server that you are requesting access for. For example, if you need access to the root account, then that is what you should enter in this field.
Once you have successfully requested access, the designated server administators will be sent a mail informing them of your request and you will need to wait for one of them to grant your access.
You will need to have a public key uploaded for your access to work. See the getting started guide.
/var/local/keys-sync
(or /root/.ssh/authorized_keys2
for legacy sync). This is typically caused by one of 3 possibilities:
/var/local/keys-sync/.hostnames
file does not exist on the server. SSH Key Authority uses the contents of this file to verify that it is allowed to sync to your server./var/local/keys-sync/.hostnames
when SSH Key Authority tried to sync to your server.If SSH Key Authority is reporting "Key directory does not exist" for your server, then Stage 1 is required.
adduser --system --disabled-password --home /var/local/keys-sync --shell /bin/sh keys-sync
/var/local/keys-sync
to 711: chmod 0711 /var/local/keys-sync
/var/local/keys-sync/keys-sync
file (owned by keys-sync, permissions 0644) with the following SSH key in it:
get('keys-sync-pubkey'))?>
/var/local/keys-sync/.hostnames
text file (owned by keys-sync, permissions 0644) with the server's hostname in itOnce Stage 1 has been deployed to your server, trigger a resync from SSH Key Authority. The server should no longer have the "Key directory does not exist" warning after syncing (the "Using legacy sync method" warning is expected at this point instead). You can check the contents of the /var/local/keys-sync
directory to make sure that the access looks right.
/etc/ssh/sshd_config
) to use:
AuthorizedKeysFile /var/local/keys-sync/%u
"
StrictModes no
"
This stage stops any .ssh/authorized_keys* files from having any effect and transfers login authentication authority over to the /var/local/keys-sync directory.
After triggering a resync from SSH Key Authority, your server should be listed as "Synced successfully".
While this sync method is simpler to set up, we recommend setting up full account syncing where possible.
Add the following to the /root/.ssh/authorized_keys
file (create it if it does not exist):
get('keys-sync-pubkey'))?>
The /root
and /root/.ssh
directories must be accessible only by root.
For access to accounts by employees:
/servers/<hostname>
).For server-to-server access, assuming that both of the servers involved are managed by SSH Key Authority:
Example: foo@source.example.com
needs SSH access to bar@destination.example.com
/servers/source.example.com
)./servers/destination.example.com
).In the above example if source.example.com is not yet known by SSH Key Authority, please contact to add it to the system.