Search

3.2. SSH Keys

download PDF

3.2.1. Introduction to SSH Keys

OpenShift Enterprise uses the Secure Shell (SSH) network protocol to authenticate account credentials to the OpenShift Enterprise servers for secure communication, and supports both RSA and DSA keys for SSH authentication. This section describes how authentication with OpenShift Enterprise works, and provides information on how to manage SSH keys for user accounts.
Successful authentication occurs when the private SSH key on your workstation matches the public key that has been uploaded to the OpenShift Enterprise server. When the client tools are initially configured, the interactive setup wizard generates a new pair of SSH keys in the default .ssh folder of your home directory. The SSH key pair consists of the public key, id_rsa.pub, and the private key, id_rsa. As part of the initial configuration, you have the option of automatically uploading the public key, id_rsa.pub, to the OpenShift Enterprise server. See the Client Tools Installation Guide for more information on how to configure the client tools.
The following table shows the types of SSH keys supported with OpenShift Enterprise.
Table 3.2. Supported SSH Keys
ssh-rsa
ssh-dss
ecdsa-sha2-nistp256-cert-v01@openssh.com
ecdsa-sha2-nistp384-cert-v01@openssh.com
ecdsa-sha2-nistp521-cert-v01@openssh.com
ssh-rsa-cert-v01@openssh.com
ssh-dss-cert-v01@openssh.com
ssh-rsa-cert-v00@openssh.com
ssh-dss-cert-v00@openssh.com
ecdsa-sha2-nistp256
ecdsa-sha2-nistp384
ecdsa-sha2-nistp521
krb5-principal
Red Hat logoGithubRedditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

© 2024 Red Hat, Inc.