Skip to content

Commit

Permalink
doc/authentication: Hints on encrypting client key
Browse files Browse the repository at this point in the history
Signed-off-by: Joseph Price <joe@pricey.uk>
  • Loading branch information
PriceChild authored and stgraber committed Feb 10, 2024
1 parent 2b9a67f commit ff8641b
Showing 1 changed file with 22 additions and 0 deletions.
22 changes: 22 additions & 0 deletions doc/authentication.md
Original file line number Diff line number Diff line change
Expand Up @@ -109,6 +109,28 @@ If the server certificate is valid and signed by the CA, then the connection con

Note that the generated certificates are not automatically trusted. You must still add them to the server in one of the ways described in {ref}`authentication-trusted-clients`.

### Encrypting local keys

The `incus` client also supports encrypted client keys. Keys generated via the methods above can be encrypted with a password, using:

```
ssh-keygen -p -o -f .config/incus/client.key
```

```{note}
Unless you enable [`keepalive` mode](remote-keepalive), then every single call to Incus will cause the prompt which may get a bit annoying:
$ incus list remote-host:
Password for client.key:
+------+-------+------+------+------+-----------+
| NAME | STATE | IPV4 | IPV6 | TYPE | SNAPSHOTS |
+------+-------+------+------+------+-----------+
```

```{note}
While the `incus` command line supports encrypted keys, tools such as [Ansible's connection plugin](https://docs.ansible.com/ansible/latest/collections/community/general/incus_connection.html) do not.
```

(authentication-openid)=
## OpenID Connect authentication

Expand Down

0 comments on commit ff8641b

Please sign in to comment.