Using SSH keys for authentication offers significant security advantages over traditional password-based logins. SSH keys are more secure, less prone to brute-force attacks, and eliminate the need for users to remember complex passwords. By leveraging LDAP for user management, you can centralize user authentication and simplify access control across multiple systems.
This guide considers creating SSH keys for LDAP (accepting OpenSSH format). If you prefer to set local keys into the VMs using Morpheus (accepting PEM format), please follow the guide at: Add your SSH key pair. |
ssh-keygen -t rsa -b 2048
~/.ssh/id_rsa
). You can optionally set a passphrase.id_rsa.ppk
) and the public key (e.g., id_rsa.pub
).Using CLI
First connect to ldap VM with your shell using credentials stored in Morpheus Cypher entries secret/ipaadmin_username and password/ipaadmin.
|
Using Web UI
All new VMs accept only SSH key authentication by default. For security reason, users are advised to modify enforce the ssh key authentication also in already existing VMs. The ssd settings can be changed with following steps:
Go to the Instance → Actions → Run workflow → force_ssh_authentication
Please make sure that you have first set up the SSH keys to your LDAP or VMs. Otherwise you won't be able to ssh into your VM after running the workflow. |
Login Using SSH Keys (Default Path):
ssh username@hostname
or
ssh -J user@ssh-proxy user@internal-vm
Login Using SSH Keys (Specified Path): If your private key is not in the default location, specify the path using the -i option:
ssh -i /path/to/private_key username@hostname
or
ssh -o "ProxyJump user@ssh-proxy" -i /path/to/private_key user@internal-vm