It is recommended you add an SSH key pair so you can use it to log into your VMs instead of a password. This key pair can also be used to access private Github or git repositories.
Once you have the keys set up in Morpheus, you can arrange for them to be added to new VMs when they are provisioned (last step below) - note that updating these keys or adding them to existing machines needs to be done manually.
If an LDAP server was provided as part of your tenancy (an option, typically default for EUMETSAT-homed tenancies), you may prefer to add the keys to the LDAP server instead - they will then work on all machines (already provisioned or future ones) and can be updated at any time. This section is just about "local" Morpheus-created users. |
To use the keys for passwordless login, please look at one of the many guides on the Internet for your ssh client (examples below) but note you may need to transform key format in some cases.
If you don't have an existing key pair already, you will need to create one.
From a Linux or Mac, you may generate it with the command (follow the instructions it prompts you with):
ssh-keygen -m pem |
This creates a key pair in "PEM" format, as required by Morpheus.
If you have a key in another format (e.g. OpenSSH, PuTTY, etc), you may need to convert it. OpenSSH can do this for its key types with ssh-keygen -m pem -f /path/to/key_to_be_converted.
For other formats, please search for an appropriate conversion mechanism or contact EWC support for help.
Browse for the private key, or paste its contents. For OpenSSH, it should normally be stored in:
~/.ssh/id_rsa |
Now that your keys are added into Morpheus, you may also configure your user profile so the keys are injected automatically into every new VM you provision when your Linux user is created. See Setting up your User Settings for more information.
Related articles appear here based on the labels you select. Click to edit the macro and add or change labels.
|