Page tree
Skip to end of metadata
Go to start of metadata

OneChicago SFTP services provides for management of Public Key Authentication for user accounts. This means customers can self-manage public keys once their SFTP accounts have been created.

Overview:

Resources:

Supported Protocols

Only Protocol version 2 is supported, which includes the following key types:

  • ecdsa-sha2-nistp256
  • ecdsa-sha2-nistp384
  • ecdsa-sha2-nistp521
  • ssh-dss
  • ssh-rsa

Sample authorized_keys

The OpenSSH standard requires 3 key fields separated by spaces and delimited by newline.

eg. <key type> <public key> <comment>

Sample authorized_keys file
ssh-rsa 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 jane.doe@widgets.com
ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBACOCuDivnjDIMXrwDJMAzxFMDUhMgjkI0cTSoDzfblrQ6vpSdsUo1dnk9fYjOXn4vnppQyLwJjJ1787QZLC9uYjggGkpdsVqnwH0DJn2hJS8d5znDQNYnMo1lxto7WRPisqJa5mKmCKPmrlWDiGFCh9Bx3hLeUlt2r4BESe2vzQ+6zgFg== john.doe@company.com

This file must be located in the .ssh folder inside the authorized_keys file. The filename is lowercase and case sensitive.

How-to


  • No labels