ngrok.SshUserCertificate
Explore with Pulumi AI
SSH User Certificates are presented by SSH clients when connecting to an SSH server to authenticate their connection. The SSH server must trust the SSH Certificate Authority used to sign the certificate.
Example Usage
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Ngrok = PiersKarsenbarg.Ngrok;
return await Deployment.RunAsync(() =>
{
var example = new Ngrok.SshUserCertificate("example", new()
{
Description = "temporary access to staging machine",
Principals = new[]
{
"ec2-user",
"root",
},
PublicKey = "ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBK58lFzmWlDimDtBz78wVT4oauA8PjY0CiXTCEIsBNC6UwOJvZ0jdSaYNhDaa7dRV84DfBb/gKzqlXC7cVMZjl0= alan@work-laptop",
SshCertificateAuthorityId = "sshca_25auH5JtiUPW9eMiXYzujvcpkGW",
ValidUntil = "2022-05-26T08:23:47Z",
});
});
package main
import (
"github.com/pulumi/pulumi-ngrok/sdk/go/ngrok"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := ngrok.NewSshUserCertificate(ctx, "example", &ngrok.SshUserCertificateArgs{
Description: pulumi.String("temporary access to staging machine"),
Principals: pulumi.StringArray{
pulumi.String("ec2-user"),
pulumi.String("root"),
},
PublicKey: pulumi.String("ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBK58lFzmWlDimDtBz78wVT4oauA8PjY0CiXTCEIsBNC6UwOJvZ0jdSaYNhDaa7dRV84DfBb/gKzqlXC7cVMZjl0= alan@work-laptop"),
SshCertificateAuthorityId: pulumi.String("sshca_25auH5JtiUPW9eMiXYzujvcpkGW"),
ValidUntil: pulumi.String("2022-05-26T08:23:47Z"),
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.ngrok.SshUserCertificate;
import com.pulumi.ngrok.SshUserCertificateArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var example = new SshUserCertificate("example", SshUserCertificateArgs.builder()
.description("temporary access to staging machine")
.principals(
"ec2-user",
"root")
.publicKey("ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBK58lFzmWlDimDtBz78wVT4oauA8PjY0CiXTCEIsBNC6UwOJvZ0jdSaYNhDaa7dRV84DfBb/gKzqlXC7cVMZjl0= alan@work-laptop")
.sshCertificateAuthorityId("sshca_25auH5JtiUPW9eMiXYzujvcpkGW")
.validUntil("2022-05-26T08:23:47Z")
.build());
}
}
import pulumi
import pierskarsenbarg_pulumi_ngrok as ngrok
example = ngrok.SshUserCertificate("example",
description="temporary access to staging machine",
principals=[
"ec2-user",
"root",
],
public_key="ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBK58lFzmWlDimDtBz78wVT4oauA8PjY0CiXTCEIsBNC6UwOJvZ0jdSaYNhDaa7dRV84DfBb/gKzqlXC7cVMZjl0= alan@work-laptop",
ssh_certificate_authority_id="sshca_25auH5JtiUPW9eMiXYzujvcpkGW",
valid_until="2022-05-26T08:23:47Z")
import * as pulumi from "@pulumi/pulumi";
import * as ngrok from "@pierskarsenbarg/ngrok";
const example = new ngrok.SshUserCertificate("example", {
description: "temporary access to staging machine",
principals: [
"ec2-user",
"root",
],
publicKey: "ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBK58lFzmWlDimDtBz78wVT4oauA8PjY0CiXTCEIsBNC6UwOJvZ0jdSaYNhDaa7dRV84DfBb/gKzqlXC7cVMZjl0= alan@work-laptop",
sshCertificateAuthorityId: "sshca_25auH5JtiUPW9eMiXYzujvcpkGW",
validUntil: "2022-05-26T08:23:47Z",
});
resources:
example:
type: ngrok:SshUserCertificate
properties:
description: temporary access to staging machine
principals:
- ec2-user
- root
publicKey: ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBK58lFzmWlDimDtBz78wVT4oauA8PjY0CiXTCEIsBNC6UwOJvZ0jdSaYNhDaa7dRV84DfBb/gKzqlXC7cVMZjl0= alan@work-laptop
sshCertificateAuthorityId: sshca_25auH5JtiUPW9eMiXYzujvcpkGW
validUntil: 2022-05-26T08:23:47Z
Create SshUserCertificate Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new SshUserCertificate(name: string, args: SshUserCertificateArgs, opts?: CustomResourceOptions);
@overload
def SshUserCertificate(resource_name: str,
args: SshUserCertificateArgs,
opts: Optional[ResourceOptions] = None)
@overload
def SshUserCertificate(resource_name: str,
opts: Optional[ResourceOptions] = None,
public_key: Optional[str] = None,
ssh_certificate_authority_id: Optional[str] = None,
certificate: Optional[str] = None,
critical_options: Optional[Mapping[str, str]] = None,
description: Optional[str] = None,
extensions: Optional[Mapping[str, str]] = None,
key_type: Optional[str] = None,
metadata: Optional[str] = None,
principals: Optional[Sequence[str]] = None,
valid_after: Optional[str] = None,
valid_until: Optional[str] = None)
func NewSshUserCertificate(ctx *Context, name string, args SshUserCertificateArgs, opts ...ResourceOption) (*SshUserCertificate, error)
public SshUserCertificate(string name, SshUserCertificateArgs args, CustomResourceOptions? opts = null)
public SshUserCertificate(String name, SshUserCertificateArgs args)
public SshUserCertificate(String name, SshUserCertificateArgs args, CustomResourceOptions options)
type: ngrok:SshUserCertificate
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args SshUserCertificateArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args SshUserCertificateArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args SshUserCertificateArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args SshUserCertificateArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args SshUserCertificateArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var sshUserCertificateResource = new Ngrok.SshUserCertificate("sshUserCertificateResource", new()
{
PublicKey = "string",
SshCertificateAuthorityId = "string",
Certificate = "string",
CriticalOptions =
{
{ "string", "string" },
},
Description = "string",
Extensions =
{
{ "string", "string" },
},
KeyType = "string",
Metadata = "string",
Principals = new[]
{
"string",
},
ValidAfter = "string",
ValidUntil = "string",
});
example, err := ngrok.NewSshUserCertificate(ctx, "sshUserCertificateResource", &ngrok.SshUserCertificateArgs{
PublicKey: pulumi.String("string"),
SshCertificateAuthorityId: pulumi.String("string"),
Certificate: pulumi.String("string"),
CriticalOptions: pulumi.StringMap{
"string": pulumi.String("string"),
},
Description: pulumi.String("string"),
Extensions: pulumi.StringMap{
"string": pulumi.String("string"),
},
KeyType: pulumi.String("string"),
Metadata: pulumi.String("string"),
Principals: pulumi.StringArray{
pulumi.String("string"),
},
ValidAfter: pulumi.String("string"),
ValidUntil: pulumi.String("string"),
})
var sshUserCertificateResource = new SshUserCertificate("sshUserCertificateResource", SshUserCertificateArgs.builder()
.publicKey("string")
.sshCertificateAuthorityId("string")
.certificate("string")
.criticalOptions(Map.of("string", "string"))
.description("string")
.extensions(Map.of("string", "string"))
.keyType("string")
.metadata("string")
.principals("string")
.validAfter("string")
.validUntil("string")
.build());
ssh_user_certificate_resource = ngrok.SshUserCertificate("sshUserCertificateResource",
public_key="string",
ssh_certificate_authority_id="string",
certificate="string",
critical_options={
"string": "string",
},
description="string",
extensions={
"string": "string",
},
key_type="string",
metadata="string",
principals=["string"],
valid_after="string",
valid_until="string")
const sshUserCertificateResource = new ngrok.SshUserCertificate("sshUserCertificateResource", {
publicKey: "string",
sshCertificateAuthorityId: "string",
certificate: "string",
criticalOptions: {
string: "string",
},
description: "string",
extensions: {
string: "string",
},
keyType: "string",
metadata: "string",
principals: ["string"],
validAfter: "string",
validUntil: "string",
});
type: ngrok:SshUserCertificate
properties:
certificate: string
criticalOptions:
string: string
description: string
extensions:
string: string
keyType: string
metadata: string
principals:
- string
publicKey: string
sshCertificateAuthorityId: string
validAfter: string
validUntil: string
SshUserCertificate Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The SshUserCertificate resource accepts the following input properties:
- Public
Key string - a public key in OpenSSH Authorized Keys format that this certificate signs
- string
- the ssh certificate authority that is used to sign this ssh user certificate
- Certificate string
- the signed SSH certificate in OpenSSH Authorized Keys Format. this value should be placed in a
-cert.pub
certificate file on disk that should be referenced in yoursshd_config
configuration file with aHostCertificate
directive - Critical
Options Dictionary<string, string> - A map of critical options included in the certificate. Only two critical options are currently defined by OpenSSH:
force-command
andsource-address
. See the OpenSSH certificate protocol spec for additional details. - Description string
- human-readable description of this SSH User Certificate. optional, max 255 bytes.
- Extensions Dictionary<string, string>
- A map of extensions included in the certificate. Extensions are additional metadata that can be interpreted by the SSH server for any purpose. These can be used to permit or deny the ability to open a terminal, do port forwarding, x11 forwarding, and more. If unspecified, the certificate will include limited permissions with the following extension map:
{"permit-pty": "", "permit-user-rc": ""}
OpenSSH understands a number of predefined extensions. See the OpenSSH certificate protocol spec for additional details. - Key
Type string - the key type of the
public_key
, one ofrsa
,ecdsa
ored25519
- Metadata string
- arbitrary user-defined machine-readable data of this SSH User Certificate. optional, max 4096 bytes.
- Principals List<string>
- the list of principals included in the ssh user certificate. This is the list of usernames that the certificate holder may sign in as on a machine authorizinig the signing certificate authority. Dangerously, if no principals are specified, this certificate may be used to log in as any user.
- Valid
After string - the time when the ssh host certificate becomes valid, in RFC 3339 format.
- Valid
Until string - the time after which the ssh host certificate becomes invalid, in RFC 3339 format. the OpenSSH certificates RFC calls this
valid_before
.
- Public
Key string - a public key in OpenSSH Authorized Keys format that this certificate signs
- string
- the ssh certificate authority that is used to sign this ssh user certificate
- Certificate string
- the signed SSH certificate in OpenSSH Authorized Keys Format. this value should be placed in a
-cert.pub
certificate file on disk that should be referenced in yoursshd_config
configuration file with aHostCertificate
directive - Critical
Options map[string]string - A map of critical options included in the certificate. Only two critical options are currently defined by OpenSSH:
force-command
andsource-address
. See the OpenSSH certificate protocol spec for additional details. - Description string
- human-readable description of this SSH User Certificate. optional, max 255 bytes.
- Extensions map[string]string
- A map of extensions included in the certificate. Extensions are additional metadata that can be interpreted by the SSH server for any purpose. These can be used to permit or deny the ability to open a terminal, do port forwarding, x11 forwarding, and more. If unspecified, the certificate will include limited permissions with the following extension map:
{"permit-pty": "", "permit-user-rc": ""}
OpenSSH understands a number of predefined extensions. See the OpenSSH certificate protocol spec for additional details. - Key
Type string - the key type of the
public_key
, one ofrsa
,ecdsa
ored25519
- Metadata string
- arbitrary user-defined machine-readable data of this SSH User Certificate. optional, max 4096 bytes.
- Principals []string
- the list of principals included in the ssh user certificate. This is the list of usernames that the certificate holder may sign in as on a machine authorizinig the signing certificate authority. Dangerously, if no principals are specified, this certificate may be used to log in as any user.
- Valid
After string - the time when the ssh host certificate becomes valid, in RFC 3339 format.
- Valid
Until string - the time after which the ssh host certificate becomes invalid, in RFC 3339 format. the OpenSSH certificates RFC calls this
valid_before
.
- public
Key String - a public key in OpenSSH Authorized Keys format that this certificate signs
- String
- the ssh certificate authority that is used to sign this ssh user certificate
- certificate String
- the signed SSH certificate in OpenSSH Authorized Keys Format. this value should be placed in a
-cert.pub
certificate file on disk that should be referenced in yoursshd_config
configuration file with aHostCertificate
directive - critical
Options Map<String,String> - A map of critical options included in the certificate. Only two critical options are currently defined by OpenSSH:
force-command
andsource-address
. See the OpenSSH certificate protocol spec for additional details. - description String
- human-readable description of this SSH User Certificate. optional, max 255 bytes.
- extensions Map<String,String>
- A map of extensions included in the certificate. Extensions are additional metadata that can be interpreted by the SSH server for any purpose. These can be used to permit or deny the ability to open a terminal, do port forwarding, x11 forwarding, and more. If unspecified, the certificate will include limited permissions with the following extension map:
{"permit-pty": "", "permit-user-rc": ""}
OpenSSH understands a number of predefined extensions. See the OpenSSH certificate protocol spec for additional details. - key
Type String - the key type of the
public_key
, one ofrsa
,ecdsa
ored25519
- metadata String
- arbitrary user-defined machine-readable data of this SSH User Certificate. optional, max 4096 bytes.
- principals List<String>
- the list of principals included in the ssh user certificate. This is the list of usernames that the certificate holder may sign in as on a machine authorizinig the signing certificate authority. Dangerously, if no principals are specified, this certificate may be used to log in as any user.
- valid
After String - the time when the ssh host certificate becomes valid, in RFC 3339 format.
- valid
Until String - the time after which the ssh host certificate becomes invalid, in RFC 3339 format. the OpenSSH certificates RFC calls this
valid_before
.
- public
Key string - a public key in OpenSSH Authorized Keys format that this certificate signs
- string
- the ssh certificate authority that is used to sign this ssh user certificate
- certificate string
- the signed SSH certificate in OpenSSH Authorized Keys Format. this value should be placed in a
-cert.pub
certificate file on disk that should be referenced in yoursshd_config
configuration file with aHostCertificate
directive - critical
Options {[key: string]: string} - A map of critical options included in the certificate. Only two critical options are currently defined by OpenSSH:
force-command
andsource-address
. See the OpenSSH certificate protocol spec for additional details. - description string
- human-readable description of this SSH User Certificate. optional, max 255 bytes.
- extensions {[key: string]: string}
- A map of extensions included in the certificate. Extensions are additional metadata that can be interpreted by the SSH server for any purpose. These can be used to permit or deny the ability to open a terminal, do port forwarding, x11 forwarding, and more. If unspecified, the certificate will include limited permissions with the following extension map:
{"permit-pty": "", "permit-user-rc": ""}
OpenSSH understands a number of predefined extensions. See the OpenSSH certificate protocol spec for additional details. - key
Type string - the key type of the
public_key
, one ofrsa
,ecdsa
ored25519
- metadata string
- arbitrary user-defined machine-readable data of this SSH User Certificate. optional, max 4096 bytes.
- principals string[]
- the list of principals included in the ssh user certificate. This is the list of usernames that the certificate holder may sign in as on a machine authorizinig the signing certificate authority. Dangerously, if no principals are specified, this certificate may be used to log in as any user.
- valid
After string - the time when the ssh host certificate becomes valid, in RFC 3339 format.
- valid
Until string - the time after which the ssh host certificate becomes invalid, in RFC 3339 format. the OpenSSH certificates RFC calls this
valid_before
.
- public_
key str - a public key in OpenSSH Authorized Keys format that this certificate signs
- str
- the ssh certificate authority that is used to sign this ssh user certificate
- certificate str
- the signed SSH certificate in OpenSSH Authorized Keys Format. this value should be placed in a
-cert.pub
certificate file on disk that should be referenced in yoursshd_config
configuration file with aHostCertificate
directive - critical_
options Mapping[str, str] - A map of critical options included in the certificate. Only two critical options are currently defined by OpenSSH:
force-command
andsource-address
. See the OpenSSH certificate protocol spec for additional details. - description str
- human-readable description of this SSH User Certificate. optional, max 255 bytes.
- extensions Mapping[str, str]
- A map of extensions included in the certificate. Extensions are additional metadata that can be interpreted by the SSH server for any purpose. These can be used to permit or deny the ability to open a terminal, do port forwarding, x11 forwarding, and more. If unspecified, the certificate will include limited permissions with the following extension map:
{"permit-pty": "", "permit-user-rc": ""}
OpenSSH understands a number of predefined extensions. See the OpenSSH certificate protocol spec for additional details. - key_
type str - the key type of the
public_key
, one ofrsa
,ecdsa
ored25519
- metadata str
- arbitrary user-defined machine-readable data of this SSH User Certificate. optional, max 4096 bytes.
- principals Sequence[str]
- the list of principals included in the ssh user certificate. This is the list of usernames that the certificate holder may sign in as on a machine authorizinig the signing certificate authority. Dangerously, if no principals are specified, this certificate may be used to log in as any user.
- valid_
after str - the time when the ssh host certificate becomes valid, in RFC 3339 format.
- valid_
until str - the time after which the ssh host certificate becomes invalid, in RFC 3339 format. the OpenSSH certificates RFC calls this
valid_before
.
- public
Key String - a public key in OpenSSH Authorized Keys format that this certificate signs
- String
- the ssh certificate authority that is used to sign this ssh user certificate
- certificate String
- the signed SSH certificate in OpenSSH Authorized Keys Format. this value should be placed in a
-cert.pub
certificate file on disk that should be referenced in yoursshd_config
configuration file with aHostCertificate
directive - critical
Options Map<String> - A map of critical options included in the certificate. Only two critical options are currently defined by OpenSSH:
force-command
andsource-address
. See the OpenSSH certificate protocol spec for additional details. - description String
- human-readable description of this SSH User Certificate. optional, max 255 bytes.
- extensions Map<String>
- A map of extensions included in the certificate. Extensions are additional metadata that can be interpreted by the SSH server for any purpose. These can be used to permit or deny the ability to open a terminal, do port forwarding, x11 forwarding, and more. If unspecified, the certificate will include limited permissions with the following extension map:
{"permit-pty": "", "permit-user-rc": ""}
OpenSSH understands a number of predefined extensions. See the OpenSSH certificate protocol spec for additional details. - key
Type String - the key type of the
public_key
, one ofrsa
,ecdsa
ored25519
- metadata String
- arbitrary user-defined machine-readable data of this SSH User Certificate. optional, max 4096 bytes.
- principals List<String>
- the list of principals included in the ssh user certificate. This is the list of usernames that the certificate holder may sign in as on a machine authorizinig the signing certificate authority. Dangerously, if no principals are specified, this certificate may be used to log in as any user.
- valid
After String - the time when the ssh host certificate becomes valid, in RFC 3339 format.
- valid
Until String - the time after which the ssh host certificate becomes invalid, in RFC 3339 format. the OpenSSH certificates RFC calls this
valid_before
.
Outputs
All input properties are implicitly available as output properties. Additionally, the SshUserCertificate resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing SshUserCertificate Resource
Get an existing SshUserCertificate resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: SshUserCertificateState, opts?: CustomResourceOptions): SshUserCertificate
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
certificate: Optional[str] = None,
critical_options: Optional[Mapping[str, str]] = None,
description: Optional[str] = None,
extensions: Optional[Mapping[str, str]] = None,
key_type: Optional[str] = None,
metadata: Optional[str] = None,
principals: Optional[Sequence[str]] = None,
public_key: Optional[str] = None,
ssh_certificate_authority_id: Optional[str] = None,
valid_after: Optional[str] = None,
valid_until: Optional[str] = None) -> SshUserCertificate
func GetSshUserCertificate(ctx *Context, name string, id IDInput, state *SshUserCertificateState, opts ...ResourceOption) (*SshUserCertificate, error)
public static SshUserCertificate Get(string name, Input<string> id, SshUserCertificateState? state, CustomResourceOptions? opts = null)
public static SshUserCertificate get(String name, Output<String> id, SshUserCertificateState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Certificate string
- the signed SSH certificate in OpenSSH Authorized Keys Format. this value should be placed in a
-cert.pub
certificate file on disk that should be referenced in yoursshd_config
configuration file with aHostCertificate
directive - Critical
Options Dictionary<string, string> - A map of critical options included in the certificate. Only two critical options are currently defined by OpenSSH:
force-command
andsource-address
. See the OpenSSH certificate protocol spec for additional details. - Description string
- human-readable description of this SSH User Certificate. optional, max 255 bytes.
- Extensions Dictionary<string, string>
- A map of extensions included in the certificate. Extensions are additional metadata that can be interpreted by the SSH server for any purpose. These can be used to permit or deny the ability to open a terminal, do port forwarding, x11 forwarding, and more. If unspecified, the certificate will include limited permissions with the following extension map:
{"permit-pty": "", "permit-user-rc": ""}
OpenSSH understands a number of predefined extensions. See the OpenSSH certificate protocol spec for additional details. - Key
Type string - the key type of the
public_key
, one ofrsa
,ecdsa
ored25519
- Metadata string
- arbitrary user-defined machine-readable data of this SSH User Certificate. optional, max 4096 bytes.
- Principals List<string>
- the list of principals included in the ssh user certificate. This is the list of usernames that the certificate holder may sign in as on a machine authorizinig the signing certificate authority. Dangerously, if no principals are specified, this certificate may be used to log in as any user.
- Public
Key string - a public key in OpenSSH Authorized Keys format that this certificate signs
- string
- the ssh certificate authority that is used to sign this ssh user certificate
- Valid
After string - the time when the ssh host certificate becomes valid, in RFC 3339 format.
- Valid
Until string - the time after which the ssh host certificate becomes invalid, in RFC 3339 format. the OpenSSH certificates RFC calls this
valid_before
.
- Certificate string
- the signed SSH certificate in OpenSSH Authorized Keys Format. this value should be placed in a
-cert.pub
certificate file on disk that should be referenced in yoursshd_config
configuration file with aHostCertificate
directive - Critical
Options map[string]string - A map of critical options included in the certificate. Only two critical options are currently defined by OpenSSH:
force-command
andsource-address
. See the OpenSSH certificate protocol spec for additional details. - Description string
- human-readable description of this SSH User Certificate. optional, max 255 bytes.
- Extensions map[string]string
- A map of extensions included in the certificate. Extensions are additional metadata that can be interpreted by the SSH server for any purpose. These can be used to permit or deny the ability to open a terminal, do port forwarding, x11 forwarding, and more. If unspecified, the certificate will include limited permissions with the following extension map:
{"permit-pty": "", "permit-user-rc": ""}
OpenSSH understands a number of predefined extensions. See the OpenSSH certificate protocol spec for additional details. - Key
Type string - the key type of the
public_key
, one ofrsa
,ecdsa
ored25519
- Metadata string
- arbitrary user-defined machine-readable data of this SSH User Certificate. optional, max 4096 bytes.
- Principals []string
- the list of principals included in the ssh user certificate. This is the list of usernames that the certificate holder may sign in as on a machine authorizinig the signing certificate authority. Dangerously, if no principals are specified, this certificate may be used to log in as any user.
- Public
Key string - a public key in OpenSSH Authorized Keys format that this certificate signs
- string
- the ssh certificate authority that is used to sign this ssh user certificate
- Valid
After string - the time when the ssh host certificate becomes valid, in RFC 3339 format.
- Valid
Until string - the time after which the ssh host certificate becomes invalid, in RFC 3339 format. the OpenSSH certificates RFC calls this
valid_before
.
- certificate String
- the signed SSH certificate in OpenSSH Authorized Keys Format. this value should be placed in a
-cert.pub
certificate file on disk that should be referenced in yoursshd_config
configuration file with aHostCertificate
directive - critical
Options Map<String,String> - A map of critical options included in the certificate. Only two critical options are currently defined by OpenSSH:
force-command
andsource-address
. See the OpenSSH certificate protocol spec for additional details. - description String
- human-readable description of this SSH User Certificate. optional, max 255 bytes.
- extensions Map<String,String>
- A map of extensions included in the certificate. Extensions are additional metadata that can be interpreted by the SSH server for any purpose. These can be used to permit or deny the ability to open a terminal, do port forwarding, x11 forwarding, and more. If unspecified, the certificate will include limited permissions with the following extension map:
{"permit-pty": "", "permit-user-rc": ""}
OpenSSH understands a number of predefined extensions. See the OpenSSH certificate protocol spec for additional details. - key
Type String - the key type of the
public_key
, one ofrsa
,ecdsa
ored25519
- metadata String
- arbitrary user-defined machine-readable data of this SSH User Certificate. optional, max 4096 bytes.
- principals List<String>
- the list of principals included in the ssh user certificate. This is the list of usernames that the certificate holder may sign in as on a machine authorizinig the signing certificate authority. Dangerously, if no principals are specified, this certificate may be used to log in as any user.
- public
Key String - a public key in OpenSSH Authorized Keys format that this certificate signs
- String
- the ssh certificate authority that is used to sign this ssh user certificate
- valid
After String - the time when the ssh host certificate becomes valid, in RFC 3339 format.
- valid
Until String - the time after which the ssh host certificate becomes invalid, in RFC 3339 format. the OpenSSH certificates RFC calls this
valid_before
.
- certificate string
- the signed SSH certificate in OpenSSH Authorized Keys Format. this value should be placed in a
-cert.pub
certificate file on disk that should be referenced in yoursshd_config
configuration file with aHostCertificate
directive - critical
Options {[key: string]: string} - A map of critical options included in the certificate. Only two critical options are currently defined by OpenSSH:
force-command
andsource-address
. See the OpenSSH certificate protocol spec for additional details. - description string
- human-readable description of this SSH User Certificate. optional, max 255 bytes.
- extensions {[key: string]: string}
- A map of extensions included in the certificate. Extensions are additional metadata that can be interpreted by the SSH server for any purpose. These can be used to permit or deny the ability to open a terminal, do port forwarding, x11 forwarding, and more. If unspecified, the certificate will include limited permissions with the following extension map:
{"permit-pty": "", "permit-user-rc": ""}
OpenSSH understands a number of predefined extensions. See the OpenSSH certificate protocol spec for additional details. - key
Type string - the key type of the
public_key
, one ofrsa
,ecdsa
ored25519
- metadata string
- arbitrary user-defined machine-readable data of this SSH User Certificate. optional, max 4096 bytes.
- principals string[]
- the list of principals included in the ssh user certificate. This is the list of usernames that the certificate holder may sign in as on a machine authorizinig the signing certificate authority. Dangerously, if no principals are specified, this certificate may be used to log in as any user.
- public
Key string - a public key in OpenSSH Authorized Keys format that this certificate signs
- string
- the ssh certificate authority that is used to sign this ssh user certificate
- valid
After string - the time when the ssh host certificate becomes valid, in RFC 3339 format.
- valid
Until string - the time after which the ssh host certificate becomes invalid, in RFC 3339 format. the OpenSSH certificates RFC calls this
valid_before
.
- certificate str
- the signed SSH certificate in OpenSSH Authorized Keys Format. this value should be placed in a
-cert.pub
certificate file on disk that should be referenced in yoursshd_config
configuration file with aHostCertificate
directive - critical_
options Mapping[str, str] - A map of critical options included in the certificate. Only two critical options are currently defined by OpenSSH:
force-command
andsource-address
. See the OpenSSH certificate protocol spec for additional details. - description str
- human-readable description of this SSH User Certificate. optional, max 255 bytes.
- extensions Mapping[str, str]
- A map of extensions included in the certificate. Extensions are additional metadata that can be interpreted by the SSH server for any purpose. These can be used to permit or deny the ability to open a terminal, do port forwarding, x11 forwarding, and more. If unspecified, the certificate will include limited permissions with the following extension map:
{"permit-pty": "", "permit-user-rc": ""}
OpenSSH understands a number of predefined extensions. See the OpenSSH certificate protocol spec for additional details. - key_
type str - the key type of the
public_key
, one ofrsa
,ecdsa
ored25519
- metadata str
- arbitrary user-defined machine-readable data of this SSH User Certificate. optional, max 4096 bytes.
- principals Sequence[str]
- the list of principals included in the ssh user certificate. This is the list of usernames that the certificate holder may sign in as on a machine authorizinig the signing certificate authority. Dangerously, if no principals are specified, this certificate may be used to log in as any user.
- public_
key str - a public key in OpenSSH Authorized Keys format that this certificate signs
- str
- the ssh certificate authority that is used to sign this ssh user certificate
- valid_
after str - the time when the ssh host certificate becomes valid, in RFC 3339 format.
- valid_
until str - the time after which the ssh host certificate becomes invalid, in RFC 3339 format. the OpenSSH certificates RFC calls this
valid_before
.
- certificate String
- the signed SSH certificate in OpenSSH Authorized Keys Format. this value should be placed in a
-cert.pub
certificate file on disk that should be referenced in yoursshd_config
configuration file with aHostCertificate
directive - critical
Options Map<String> - A map of critical options included in the certificate. Only two critical options are currently defined by OpenSSH:
force-command
andsource-address
. See the OpenSSH certificate protocol spec for additional details. - description String
- human-readable description of this SSH User Certificate. optional, max 255 bytes.
- extensions Map<String>
- A map of extensions included in the certificate. Extensions are additional metadata that can be interpreted by the SSH server for any purpose. These can be used to permit or deny the ability to open a terminal, do port forwarding, x11 forwarding, and more. If unspecified, the certificate will include limited permissions with the following extension map:
{"permit-pty": "", "permit-user-rc": ""}
OpenSSH understands a number of predefined extensions. See the OpenSSH certificate protocol spec for additional details. - key
Type String - the key type of the
public_key
, one ofrsa
,ecdsa
ored25519
- metadata String
- arbitrary user-defined machine-readable data of this SSH User Certificate. optional, max 4096 bytes.
- principals List<String>
- the list of principals included in the ssh user certificate. This is the list of usernames that the certificate holder may sign in as on a machine authorizinig the signing certificate authority. Dangerously, if no principals are specified, this certificate may be used to log in as any user.
- public
Key String - a public key in OpenSSH Authorized Keys format that this certificate signs
- String
- the ssh certificate authority that is used to sign this ssh user certificate
- valid
After String - the time when the ssh host certificate becomes valid, in RFC 3339 format.
- valid
Until String - the time after which the ssh host certificate becomes invalid, in RFC 3339 format. the OpenSSH certificates RFC calls this
valid_before
.
Package Details
- Repository
- ngrok pierskarsenbarg/pulumi-ngrok
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
ngrok
Terraform Provider.