1. Packages
  2. ngrok
  3. API Docs
  4. SshUserCertificate
ngrok v0.0.24 published on Friday, Sep 29, 2023 by Piers Karsenbarg

ngrok.SshUserCertificate

Explore with Pulumi AI

ngrok logo
ngrok v0.0.24 published on Friday, Sep 29, 2023 by Piers Karsenbarg

    SSH User Certificates are presented by SSH clients when connecting to an SSH server to authenticate their connection. The SSH server must trust the SSH Certificate Authority used to sign the certificate.

    Example Usage

    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Ngrok = PiersKarsenbarg.Ngrok;
    
    return await Deployment.RunAsync(() => 
    {
        var example = new Ngrok.SshUserCertificate("example", new()
        {
            Description = "temporary access to staging machine",
            Principals = new[]
            {
                "ec2-user",
                "root",
            },
            PublicKey = "ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBK58lFzmWlDimDtBz78wVT4oauA8PjY0CiXTCEIsBNC6UwOJvZ0jdSaYNhDaa7dRV84DfBb/gKzqlXC7cVMZjl0= alan@work-laptop",
            SshCertificateAuthorityId = "sshca_25auH5JtiUPW9eMiXYzujvcpkGW",
            ValidUntil = "2022-05-26T08:23:47Z",
        });
    
    });
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-ngrok/sdk/go/ngrok"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := ngrok.NewSshUserCertificate(ctx, "example", &ngrok.SshUserCertificateArgs{
    			Description: pulumi.String("temporary access to staging machine"),
    			Principals: pulumi.StringArray{
    				pulumi.String("ec2-user"),
    				pulumi.String("root"),
    			},
    			PublicKey:                 pulumi.String("ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBK58lFzmWlDimDtBz78wVT4oauA8PjY0CiXTCEIsBNC6UwOJvZ0jdSaYNhDaa7dRV84DfBb/gKzqlXC7cVMZjl0= alan@work-laptop"),
    			SshCertificateAuthorityId: pulumi.String("sshca_25auH5JtiUPW9eMiXYzujvcpkGW"),
    			ValidUntil:                pulumi.String("2022-05-26T08:23:47Z"),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.ngrok.SshUserCertificate;
    import com.pulumi.ngrok.SshUserCertificateArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var example = new SshUserCertificate("example", SshUserCertificateArgs.builder()        
                .description("temporary access to staging machine")
                .principals(            
                    "ec2-user",
                    "root")
                .publicKey("ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBK58lFzmWlDimDtBz78wVT4oauA8PjY0CiXTCEIsBNC6UwOJvZ0jdSaYNhDaa7dRV84DfBb/gKzqlXC7cVMZjl0= alan@work-laptop")
                .sshCertificateAuthorityId("sshca_25auH5JtiUPW9eMiXYzujvcpkGW")
                .validUntil("2022-05-26T08:23:47Z")
                .build());
    
        }
    }
    
    import pulumi
    import pierskarsenbarg_pulumi_ngrok as ngrok
    
    example = ngrok.SshUserCertificate("example",
        description="temporary access to staging machine",
        principals=[
            "ec2-user",
            "root",
        ],
        public_key="ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBK58lFzmWlDimDtBz78wVT4oauA8PjY0CiXTCEIsBNC6UwOJvZ0jdSaYNhDaa7dRV84DfBb/gKzqlXC7cVMZjl0= alan@work-laptop",
        ssh_certificate_authority_id="sshca_25auH5JtiUPW9eMiXYzujvcpkGW",
        valid_until="2022-05-26T08:23:47Z")
    
    import * as pulumi from "@pulumi/pulumi";
    import * as ngrok from "@pierskarsenbarg/ngrok";
    
    const example = new ngrok.SshUserCertificate("example", {
        description: "temporary access to staging machine",
        principals: [
            "ec2-user",
            "root",
        ],
        publicKey: "ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBK58lFzmWlDimDtBz78wVT4oauA8PjY0CiXTCEIsBNC6UwOJvZ0jdSaYNhDaa7dRV84DfBb/gKzqlXC7cVMZjl0= alan@work-laptop",
        sshCertificateAuthorityId: "sshca_25auH5JtiUPW9eMiXYzujvcpkGW",
        validUntil: "2022-05-26T08:23:47Z",
    });
    
    resources:
      example:
        type: ngrok:SshUserCertificate
        properties:
          description: temporary access to staging machine
          principals:
            - ec2-user
            - root
          publicKey: ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBK58lFzmWlDimDtBz78wVT4oauA8PjY0CiXTCEIsBNC6UwOJvZ0jdSaYNhDaa7dRV84DfBb/gKzqlXC7cVMZjl0= alan@work-laptop
          sshCertificateAuthorityId: sshca_25auH5JtiUPW9eMiXYzujvcpkGW
          validUntil: 2022-05-26T08:23:47Z
    

    Create SshUserCertificate Resource

    new SshUserCertificate(name: string, args: SshUserCertificateArgs, opts?: CustomResourceOptions);
    @overload
    def SshUserCertificate(resource_name: str,
                           opts: Optional[ResourceOptions] = None,
                           certificate: Optional[str] = None,
                           critical_options: Optional[Mapping[str, str]] = None,
                           description: Optional[str] = None,
                           extensions: Optional[Mapping[str, str]] = None,
                           key_type: Optional[str] = None,
                           metadata: Optional[str] = None,
                           principals: Optional[Sequence[str]] = None,
                           public_key: Optional[str] = None,
                           ssh_certificate_authority_id: Optional[str] = None,
                           valid_after: Optional[str] = None,
                           valid_until: Optional[str] = None)
    @overload
    def SshUserCertificate(resource_name: str,
                           args: SshUserCertificateArgs,
                           opts: Optional[ResourceOptions] = None)
    func NewSshUserCertificate(ctx *Context, name string, args SshUserCertificateArgs, opts ...ResourceOption) (*SshUserCertificate, error)
    public SshUserCertificate(string name, SshUserCertificateArgs args, CustomResourceOptions? opts = null)
    public SshUserCertificate(String name, SshUserCertificateArgs args)
    public SshUserCertificate(String name, SshUserCertificateArgs args, CustomResourceOptions options)
    
    type: ngrok:SshUserCertificate
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    
    name string
    The unique name of the resource.
    args SshUserCertificateArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args SshUserCertificateArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args SshUserCertificateArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args SshUserCertificateArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args SshUserCertificateArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    SshUserCertificate Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    The SshUserCertificate resource accepts the following input properties:

    PublicKey string

    a public key in OpenSSH Authorized Keys format that this certificate signs

    SshCertificateAuthorityId string

    the ssh certificate authority that is used to sign this ssh user certificate

    Certificate string

    the signed SSH certificate in OpenSSH Authorized Keys Format. this value should be placed in a -cert.pub certificate file on disk that should be referenced in your sshd_config configuration file with a HostCertificate directive

    CriticalOptions Dictionary<string, string>

    A map of critical options included in the certificate. Only two critical options are currently defined by OpenSSH: force-command and source-address. See the OpenSSH certificate protocol spec for additional details.

    Description string

    human-readable description of this SSH User Certificate. optional, max 255 bytes.

    Extensions Dictionary<string, string>

    A map of extensions included in the certificate. Extensions are additional metadata that can be interpreted by the SSH server for any purpose. These can be used to permit or deny the ability to open a terminal, do port forwarding, x11 forwarding, and more. If unspecified, the certificate will include limited permissions with the following extension map: {"permit-pty": "", "permit-user-rc": ""} OpenSSH understands a number of predefined extensions. See the OpenSSH certificate protocol spec for additional details.

    KeyType string

    the key type of the public_key, one of rsa, ecdsa or ed25519

    Metadata string

    arbitrary user-defined machine-readable data of this SSH User Certificate. optional, max 4096 bytes.

    Principals List<string>

    the list of principals included in the ssh user certificate. This is the list of usernames that the certificate holder may sign in as on a machine authorizinig the signing certificate authority. Dangerously, if no principals are specified, this certificate may be used to log in as any user.

    ValidAfter string

    the time when the ssh host certificate becomes valid, in RFC 3339 format.

    ValidUntil string

    the time after which the ssh host certificate becomes invalid, in RFC 3339 format. the OpenSSH certificates RFC calls this valid_before.

    PublicKey string

    a public key in OpenSSH Authorized Keys format that this certificate signs

    SshCertificateAuthorityId string

    the ssh certificate authority that is used to sign this ssh user certificate

    Certificate string

    the signed SSH certificate in OpenSSH Authorized Keys Format. this value should be placed in a -cert.pub certificate file on disk that should be referenced in your sshd_config configuration file with a HostCertificate directive

    CriticalOptions map[string]string

    A map of critical options included in the certificate. Only two critical options are currently defined by OpenSSH: force-command and source-address. See the OpenSSH certificate protocol spec for additional details.

    Description string

    human-readable description of this SSH User Certificate. optional, max 255 bytes.

    Extensions map[string]string

    A map of extensions included in the certificate. Extensions are additional metadata that can be interpreted by the SSH server for any purpose. These can be used to permit or deny the ability to open a terminal, do port forwarding, x11 forwarding, and more. If unspecified, the certificate will include limited permissions with the following extension map: {"permit-pty": "", "permit-user-rc": ""} OpenSSH understands a number of predefined extensions. See the OpenSSH certificate protocol spec for additional details.

    KeyType string

    the key type of the public_key, one of rsa, ecdsa or ed25519

    Metadata string

    arbitrary user-defined machine-readable data of this SSH User Certificate. optional, max 4096 bytes.

    Principals []string

    the list of principals included in the ssh user certificate. This is the list of usernames that the certificate holder may sign in as on a machine authorizinig the signing certificate authority. Dangerously, if no principals are specified, this certificate may be used to log in as any user.

    ValidAfter string

    the time when the ssh host certificate becomes valid, in RFC 3339 format.

    ValidUntil string

    the time after which the ssh host certificate becomes invalid, in RFC 3339 format. the OpenSSH certificates RFC calls this valid_before.

    publicKey String

    a public key in OpenSSH Authorized Keys format that this certificate signs

    sshCertificateAuthorityId String

    the ssh certificate authority that is used to sign this ssh user certificate

    certificate String

    the signed SSH certificate in OpenSSH Authorized Keys Format. this value should be placed in a -cert.pub certificate file on disk that should be referenced in your sshd_config configuration file with a HostCertificate directive

    criticalOptions Map<String,String>

    A map of critical options included in the certificate. Only two critical options are currently defined by OpenSSH: force-command and source-address. See the OpenSSH certificate protocol spec for additional details.

    description String

    human-readable description of this SSH User Certificate. optional, max 255 bytes.

    extensions Map<String,String>

    A map of extensions included in the certificate. Extensions are additional metadata that can be interpreted by the SSH server for any purpose. These can be used to permit or deny the ability to open a terminal, do port forwarding, x11 forwarding, and more. If unspecified, the certificate will include limited permissions with the following extension map: {"permit-pty": "", "permit-user-rc": ""} OpenSSH understands a number of predefined extensions. See the OpenSSH certificate protocol spec for additional details.

    keyType String

    the key type of the public_key, one of rsa, ecdsa or ed25519

    metadata String

    arbitrary user-defined machine-readable data of this SSH User Certificate. optional, max 4096 bytes.

    principals List<String>

    the list of principals included in the ssh user certificate. This is the list of usernames that the certificate holder may sign in as on a machine authorizinig the signing certificate authority. Dangerously, if no principals are specified, this certificate may be used to log in as any user.

    validAfter String

    the time when the ssh host certificate becomes valid, in RFC 3339 format.

    validUntil String

    the time after which the ssh host certificate becomes invalid, in RFC 3339 format. the OpenSSH certificates RFC calls this valid_before.

    publicKey string

    a public key in OpenSSH Authorized Keys format that this certificate signs

    sshCertificateAuthorityId string

    the ssh certificate authority that is used to sign this ssh user certificate

    certificate string

    the signed SSH certificate in OpenSSH Authorized Keys Format. this value should be placed in a -cert.pub certificate file on disk that should be referenced in your sshd_config configuration file with a HostCertificate directive

    criticalOptions {[key: string]: string}

    A map of critical options included in the certificate. Only two critical options are currently defined by OpenSSH: force-command and source-address. See the OpenSSH certificate protocol spec for additional details.

    description string

    human-readable description of this SSH User Certificate. optional, max 255 bytes.

    extensions {[key: string]: string}

    A map of extensions included in the certificate. Extensions are additional metadata that can be interpreted by the SSH server for any purpose. These can be used to permit or deny the ability to open a terminal, do port forwarding, x11 forwarding, and more. If unspecified, the certificate will include limited permissions with the following extension map: {"permit-pty": "", "permit-user-rc": ""} OpenSSH understands a number of predefined extensions. See the OpenSSH certificate protocol spec for additional details.

    keyType string

    the key type of the public_key, one of rsa, ecdsa or ed25519

    metadata string

    arbitrary user-defined machine-readable data of this SSH User Certificate. optional, max 4096 bytes.

    principals string[]

    the list of principals included in the ssh user certificate. This is the list of usernames that the certificate holder may sign in as on a machine authorizinig the signing certificate authority. Dangerously, if no principals are specified, this certificate may be used to log in as any user.

    validAfter string

    the time when the ssh host certificate becomes valid, in RFC 3339 format.

    validUntil string

    the time after which the ssh host certificate becomes invalid, in RFC 3339 format. the OpenSSH certificates RFC calls this valid_before.

    public_key str

    a public key in OpenSSH Authorized Keys format that this certificate signs

    ssh_certificate_authority_id str

    the ssh certificate authority that is used to sign this ssh user certificate

    certificate str

    the signed SSH certificate in OpenSSH Authorized Keys Format. this value should be placed in a -cert.pub certificate file on disk that should be referenced in your sshd_config configuration file with a HostCertificate directive

    critical_options Mapping[str, str]

    A map of critical options included in the certificate. Only two critical options are currently defined by OpenSSH: force-command and source-address. See the OpenSSH certificate protocol spec for additional details.

    description str

    human-readable description of this SSH User Certificate. optional, max 255 bytes.

    extensions Mapping[str, str]

    A map of extensions included in the certificate. Extensions are additional metadata that can be interpreted by the SSH server for any purpose. These can be used to permit or deny the ability to open a terminal, do port forwarding, x11 forwarding, and more. If unspecified, the certificate will include limited permissions with the following extension map: {"permit-pty": "", "permit-user-rc": ""} OpenSSH understands a number of predefined extensions. See the OpenSSH certificate protocol spec for additional details.

    key_type str

    the key type of the public_key, one of rsa, ecdsa or ed25519

    metadata str

    arbitrary user-defined machine-readable data of this SSH User Certificate. optional, max 4096 bytes.

    principals Sequence[str]

    the list of principals included in the ssh user certificate. This is the list of usernames that the certificate holder may sign in as on a machine authorizinig the signing certificate authority. Dangerously, if no principals are specified, this certificate may be used to log in as any user.

    valid_after str

    the time when the ssh host certificate becomes valid, in RFC 3339 format.

    valid_until str

    the time after which the ssh host certificate becomes invalid, in RFC 3339 format. the OpenSSH certificates RFC calls this valid_before.

    publicKey String

    a public key in OpenSSH Authorized Keys format that this certificate signs

    sshCertificateAuthorityId String

    the ssh certificate authority that is used to sign this ssh user certificate

    certificate String

    the signed SSH certificate in OpenSSH Authorized Keys Format. this value should be placed in a -cert.pub certificate file on disk that should be referenced in your sshd_config configuration file with a HostCertificate directive

    criticalOptions Map<String>

    A map of critical options included in the certificate. Only two critical options are currently defined by OpenSSH: force-command and source-address. See the OpenSSH certificate protocol spec for additional details.

    description String

    human-readable description of this SSH User Certificate. optional, max 255 bytes.

    extensions Map<String>

    A map of extensions included in the certificate. Extensions are additional metadata that can be interpreted by the SSH server for any purpose. These can be used to permit or deny the ability to open a terminal, do port forwarding, x11 forwarding, and more. If unspecified, the certificate will include limited permissions with the following extension map: {"permit-pty": "", "permit-user-rc": ""} OpenSSH understands a number of predefined extensions. See the OpenSSH certificate protocol spec for additional details.

    keyType String

    the key type of the public_key, one of rsa, ecdsa or ed25519

    metadata String

    arbitrary user-defined machine-readable data of this SSH User Certificate. optional, max 4096 bytes.

    principals List<String>

    the list of principals included in the ssh user certificate. This is the list of usernames that the certificate holder may sign in as on a machine authorizinig the signing certificate authority. Dangerously, if no principals are specified, this certificate may be used to log in as any user.

    validAfter String

    the time when the ssh host certificate becomes valid, in RFC 3339 format.

    validUntil String

    the time after which the ssh host certificate becomes invalid, in RFC 3339 format. the OpenSSH certificates RFC calls this valid_before.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the SshUserCertificate resource produces the following output properties:

    Id string

    The provider-assigned unique ID for this managed resource.

    Id string

    The provider-assigned unique ID for this managed resource.

    id String

    The provider-assigned unique ID for this managed resource.

    id string

    The provider-assigned unique ID for this managed resource.

    id str

    The provider-assigned unique ID for this managed resource.

    id String

    The provider-assigned unique ID for this managed resource.

    Look up Existing SshUserCertificate Resource

    Get an existing SshUserCertificate resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: SshUserCertificateState, opts?: CustomResourceOptions): SshUserCertificate
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            certificate: Optional[str] = None,
            critical_options: Optional[Mapping[str, str]] = None,
            description: Optional[str] = None,
            extensions: Optional[Mapping[str, str]] = None,
            key_type: Optional[str] = None,
            metadata: Optional[str] = None,
            principals: Optional[Sequence[str]] = None,
            public_key: Optional[str] = None,
            ssh_certificate_authority_id: Optional[str] = None,
            valid_after: Optional[str] = None,
            valid_until: Optional[str] = None) -> SshUserCertificate
    func GetSshUserCertificate(ctx *Context, name string, id IDInput, state *SshUserCertificateState, opts ...ResourceOption) (*SshUserCertificate, error)
    public static SshUserCertificate Get(string name, Input<string> id, SshUserCertificateState? state, CustomResourceOptions? opts = null)
    public static SshUserCertificate get(String name, Output<String> id, SshUserCertificateState state, CustomResourceOptions options)
    Resource lookup is not supported in YAML
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    Certificate string

    the signed SSH certificate in OpenSSH Authorized Keys Format. this value should be placed in a -cert.pub certificate file on disk that should be referenced in your sshd_config configuration file with a HostCertificate directive

    CriticalOptions Dictionary<string, string>

    A map of critical options included in the certificate. Only two critical options are currently defined by OpenSSH: force-command and source-address. See the OpenSSH certificate protocol spec for additional details.

    Description string

    human-readable description of this SSH User Certificate. optional, max 255 bytes.

    Extensions Dictionary<string, string>

    A map of extensions included in the certificate. Extensions are additional metadata that can be interpreted by the SSH server for any purpose. These can be used to permit or deny the ability to open a terminal, do port forwarding, x11 forwarding, and more. If unspecified, the certificate will include limited permissions with the following extension map: {"permit-pty": "", "permit-user-rc": ""} OpenSSH understands a number of predefined extensions. See the OpenSSH certificate protocol spec for additional details.

    KeyType string

    the key type of the public_key, one of rsa, ecdsa or ed25519

    Metadata string

    arbitrary user-defined machine-readable data of this SSH User Certificate. optional, max 4096 bytes.

    Principals List<string>

    the list of principals included in the ssh user certificate. This is the list of usernames that the certificate holder may sign in as on a machine authorizinig the signing certificate authority. Dangerously, if no principals are specified, this certificate may be used to log in as any user.

    PublicKey string

    a public key in OpenSSH Authorized Keys format that this certificate signs

    SshCertificateAuthorityId string

    the ssh certificate authority that is used to sign this ssh user certificate

    ValidAfter string

    the time when the ssh host certificate becomes valid, in RFC 3339 format.

    ValidUntil string

    the time after which the ssh host certificate becomes invalid, in RFC 3339 format. the OpenSSH certificates RFC calls this valid_before.

    Certificate string

    the signed SSH certificate in OpenSSH Authorized Keys Format. this value should be placed in a -cert.pub certificate file on disk that should be referenced in your sshd_config configuration file with a HostCertificate directive

    CriticalOptions map[string]string

    A map of critical options included in the certificate. Only two critical options are currently defined by OpenSSH: force-command and source-address. See the OpenSSH certificate protocol spec for additional details.

    Description string

    human-readable description of this SSH User Certificate. optional, max 255 bytes.

    Extensions map[string]string

    A map of extensions included in the certificate. Extensions are additional metadata that can be interpreted by the SSH server for any purpose. These can be used to permit or deny the ability to open a terminal, do port forwarding, x11 forwarding, and more. If unspecified, the certificate will include limited permissions with the following extension map: {"permit-pty": "", "permit-user-rc": ""} OpenSSH understands a number of predefined extensions. See the OpenSSH certificate protocol spec for additional details.

    KeyType string

    the key type of the public_key, one of rsa, ecdsa or ed25519

    Metadata string

    arbitrary user-defined machine-readable data of this SSH User Certificate. optional, max 4096 bytes.

    Principals []string

    the list of principals included in the ssh user certificate. This is the list of usernames that the certificate holder may sign in as on a machine authorizinig the signing certificate authority. Dangerously, if no principals are specified, this certificate may be used to log in as any user.

    PublicKey string

    a public key in OpenSSH Authorized Keys format that this certificate signs

    SshCertificateAuthorityId string

    the ssh certificate authority that is used to sign this ssh user certificate

    ValidAfter string

    the time when the ssh host certificate becomes valid, in RFC 3339 format.

    ValidUntil string

    the time after which the ssh host certificate becomes invalid, in RFC 3339 format. the OpenSSH certificates RFC calls this valid_before.

    certificate String

    the signed SSH certificate in OpenSSH Authorized Keys Format. this value should be placed in a -cert.pub certificate file on disk that should be referenced in your sshd_config configuration file with a HostCertificate directive

    criticalOptions Map<String,String>

    A map of critical options included in the certificate. Only two critical options are currently defined by OpenSSH: force-command and source-address. See the OpenSSH certificate protocol spec for additional details.

    description String

    human-readable description of this SSH User Certificate. optional, max 255 bytes.

    extensions Map<String,String>

    A map of extensions included in the certificate. Extensions are additional metadata that can be interpreted by the SSH server for any purpose. These can be used to permit or deny the ability to open a terminal, do port forwarding, x11 forwarding, and more. If unspecified, the certificate will include limited permissions with the following extension map: {"permit-pty": "", "permit-user-rc": ""} OpenSSH understands a number of predefined extensions. See the OpenSSH certificate protocol spec for additional details.

    keyType String

    the key type of the public_key, one of rsa, ecdsa or ed25519

    metadata String

    arbitrary user-defined machine-readable data of this SSH User Certificate. optional, max 4096 bytes.

    principals List<String>

    the list of principals included in the ssh user certificate. This is the list of usernames that the certificate holder may sign in as on a machine authorizinig the signing certificate authority. Dangerously, if no principals are specified, this certificate may be used to log in as any user.

    publicKey String

    a public key in OpenSSH Authorized Keys format that this certificate signs

    sshCertificateAuthorityId String

    the ssh certificate authority that is used to sign this ssh user certificate

    validAfter String

    the time when the ssh host certificate becomes valid, in RFC 3339 format.

    validUntil String

    the time after which the ssh host certificate becomes invalid, in RFC 3339 format. the OpenSSH certificates RFC calls this valid_before.

    certificate string

    the signed SSH certificate in OpenSSH Authorized Keys Format. this value should be placed in a -cert.pub certificate file on disk that should be referenced in your sshd_config configuration file with a HostCertificate directive

    criticalOptions {[key: string]: string}

    A map of critical options included in the certificate. Only two critical options are currently defined by OpenSSH: force-command and source-address. See the OpenSSH certificate protocol spec for additional details.

    description string

    human-readable description of this SSH User Certificate. optional, max 255 bytes.

    extensions {[key: string]: string}

    A map of extensions included in the certificate. Extensions are additional metadata that can be interpreted by the SSH server for any purpose. These can be used to permit or deny the ability to open a terminal, do port forwarding, x11 forwarding, and more. If unspecified, the certificate will include limited permissions with the following extension map: {"permit-pty": "", "permit-user-rc": ""} OpenSSH understands a number of predefined extensions. See the OpenSSH certificate protocol spec for additional details.

    keyType string

    the key type of the public_key, one of rsa, ecdsa or ed25519

    metadata string

    arbitrary user-defined machine-readable data of this SSH User Certificate. optional, max 4096 bytes.

    principals string[]

    the list of principals included in the ssh user certificate. This is the list of usernames that the certificate holder may sign in as on a machine authorizinig the signing certificate authority. Dangerously, if no principals are specified, this certificate may be used to log in as any user.

    publicKey string

    a public key in OpenSSH Authorized Keys format that this certificate signs

    sshCertificateAuthorityId string

    the ssh certificate authority that is used to sign this ssh user certificate

    validAfter string

    the time when the ssh host certificate becomes valid, in RFC 3339 format.

    validUntil string

    the time after which the ssh host certificate becomes invalid, in RFC 3339 format. the OpenSSH certificates RFC calls this valid_before.

    certificate str

    the signed SSH certificate in OpenSSH Authorized Keys Format. this value should be placed in a -cert.pub certificate file on disk that should be referenced in your sshd_config configuration file with a HostCertificate directive

    critical_options Mapping[str, str]

    A map of critical options included in the certificate. Only two critical options are currently defined by OpenSSH: force-command and source-address. See the OpenSSH certificate protocol spec for additional details.

    description str

    human-readable description of this SSH User Certificate. optional, max 255 bytes.

    extensions Mapping[str, str]

    A map of extensions included in the certificate. Extensions are additional metadata that can be interpreted by the SSH server for any purpose. These can be used to permit or deny the ability to open a terminal, do port forwarding, x11 forwarding, and more. If unspecified, the certificate will include limited permissions with the following extension map: {"permit-pty": "", "permit-user-rc": ""} OpenSSH understands a number of predefined extensions. See the OpenSSH certificate protocol spec for additional details.

    key_type str

    the key type of the public_key, one of rsa, ecdsa or ed25519

    metadata str

    arbitrary user-defined machine-readable data of this SSH User Certificate. optional, max 4096 bytes.

    principals Sequence[str]

    the list of principals included in the ssh user certificate. This is the list of usernames that the certificate holder may sign in as on a machine authorizinig the signing certificate authority. Dangerously, if no principals are specified, this certificate may be used to log in as any user.

    public_key str

    a public key in OpenSSH Authorized Keys format that this certificate signs

    ssh_certificate_authority_id str

    the ssh certificate authority that is used to sign this ssh user certificate

    valid_after str

    the time when the ssh host certificate becomes valid, in RFC 3339 format.

    valid_until str

    the time after which the ssh host certificate becomes invalid, in RFC 3339 format. the OpenSSH certificates RFC calls this valid_before.

    certificate String

    the signed SSH certificate in OpenSSH Authorized Keys Format. this value should be placed in a -cert.pub certificate file on disk that should be referenced in your sshd_config configuration file with a HostCertificate directive

    criticalOptions Map<String>

    A map of critical options included in the certificate. Only two critical options are currently defined by OpenSSH: force-command and source-address. See the OpenSSH certificate protocol spec for additional details.

    description String

    human-readable description of this SSH User Certificate. optional, max 255 bytes.

    extensions Map<String>

    A map of extensions included in the certificate. Extensions are additional metadata that can be interpreted by the SSH server for any purpose. These can be used to permit or deny the ability to open a terminal, do port forwarding, x11 forwarding, and more. If unspecified, the certificate will include limited permissions with the following extension map: {"permit-pty": "", "permit-user-rc": ""} OpenSSH understands a number of predefined extensions. See the OpenSSH certificate protocol spec for additional details.

    keyType String

    the key type of the public_key, one of rsa, ecdsa or ed25519

    metadata String

    arbitrary user-defined machine-readable data of this SSH User Certificate. optional, max 4096 bytes.

    principals List<String>

    the list of principals included in the ssh user certificate. This is the list of usernames that the certificate holder may sign in as on a machine authorizinig the signing certificate authority. Dangerously, if no principals are specified, this certificate may be used to log in as any user.

    publicKey String

    a public key in OpenSSH Authorized Keys format that this certificate signs

    sshCertificateAuthorityId String

    the ssh certificate authority that is used to sign this ssh user certificate

    validAfter String

    the time when the ssh host certificate becomes valid, in RFC 3339 format.

    validUntil String

    the time after which the ssh host certificate becomes invalid, in RFC 3339 format. the OpenSSH certificates RFC calls this valid_before.

    Package Details

    Repository
    ngrok pierskarsenbarg/pulumi-ngrok
    License
    Apache-2.0
    Notes

    This Pulumi package is based on the ngrok Terraform Provider.

    ngrok logo
    ngrok v0.0.24 published on Friday, Sep 29, 2023 by Piers Karsenbarg