...
- openssh (standard command line tool for Linux and Mac) - https://serverpilot.io/docs/how-to-use-ssh-public-key-authentication/
- PuTTY - https://system.cs.kuleuven.be/cs/system/security/ssh/setupkeys/putty-with-key.html
- mobaxterm - https://cinhtau.net/2016/02/03/use-ssh-keys-for-authentication-with-mobaxterm/
Creating the keys
If You will need to create a key pair if you don't have an existing key pair already, you will need to create one. If you do, then see below.
From a Linux or Mac, you may generate it with the command (follow the instructions it prompts you with):
...
This creates a key pair in "PEM" format, as required by Morpheus.
Converting existing keys
Note that it's often good practice to use different credentials for different services, so you may want to create a new key pair instead of reusing existing ones.
However, if you do want to reuse existing keys, they're probably in OpenSSH format, and Morpheus wants PEM (RSA) format. Take a copy first, as the conversion process overwrites the original, then run ssh-keygen -p -
If you have a key in another format (e.g. OpenSSH, PuTTY, etc), you may need to convert it. OpenSSH can do this for its key types with ssh-keygen -m pem -f /path/to/key_to_be_converted_and_overwritten.
For other non-OpenSSH formats or clients, please search for an appropriate conversion mechanism or contact EWC support for help.
Adding the keys in Morpheus
- Go to Infrastructure -Keys & Certs> Trust -> Key Pairs.
- Click the + ADD button
button
As options you can select alternatively:
- select "Existing Key Pair" if you you have already your keys pairs
or
- select "Generate Key Pair" if you want to let Morpheus to generate a key pair (private and public keys) for you. In this case save the generated private key.
- When importing an "Existing Key Pair" the The following screen should appear:
- Give a meaningful name to the key, such as your username.
- You can leave the public key field blank - Morpheus will fill this automatically by (re)generating it from the private key.
Browse for the private key, or paste its contents. For OpenSSH, it should normally be stored in:
No Format ~/.ssh/id_rsa
- If your private key requires a passphrase, add it into the relevant text box.
- Save changes
...