Uploaded image for project: 'OpenShift Virtualization'
  1. OpenShift Virtualization
  2. CNV-23135

Authorized SSH Key Managment

XMLWordPrintable

    • autorized-ssh-key-managment
    • Product / Portfolio Work
    • Hide

      The default configuration of RHEL does not allow password authorization during logging in via ssh.
      For this reason, it is required to set a ssh key to login.
      The same user, might want to use her ssh key to log into multiple VMs.
      For this reason, it would be convenient if the user could manage her ssh-keys in the UI.
      CNV-19111 already enabled the user to pick up an ssh key from a secret.
      It would be nice if the UI would provide a way to mark a secret containing an ssh-key as not owned by the VM, so that the user could use the key for multiple VMs.
      In the future, an existing ssh-key secret could be injected dynamically ( CNV-6036 ) into a VM to ssh into a VM from the web ui, e.g. via OpenShift Web Terminal (CNV-18480).

      Show
      The default configuration of RHEL does not allow password authorization during logging in via ssh. For this reason, it is required to set a ssh key to login. The same user, might want to use her ssh key to log into multiple VMs. For this reason, it would be convenient if the user could manage her ssh-keys in the UI. CNV-19111 already enabled the user to pick up an ssh key from a secret. It would be nice if the UI would provide a way to mark a secret containing an ssh-key as not owned by the VM, so that the user could use the key for multiple VMs. In the future, an existing ssh-key secret could be injected dynamically ( CNV-6036 ) into a VM to ssh into a VM from the web ui, e.g. via OpenShift Web Terminal (CNV-18480).
    • Green
    • To Do
    • VIRTSTRAT-402 - UI user customization
    • 0% To Do, 0% In Progress, 100% Done
    • dev-ready, doc-ready, po-ready, qe-ready, ux-ready
    • Hide

      2023-11-13: Done...

      Show
      2023-11-13: Done...

      Goal

      The default configuration of RHEL does not allow password authorization during logging in via ssh.
      For this reason, it is required to set a ssh key to login.
      The same user, might want to use her ssh key to log into multiple VMs.
      For this reason, it would be convenient if the user could manage her ssh-keys in the UI.
      CNV-19111 already enabled the user to pick up an ssh key from a secret.
      It would be nice if the UI would provide a way to mark a secret containing an ssh-key as not owned by the VM, so that the user could use the key for multiple VMs.
      In the future, an existing ssh-key secret could be injected dynamically ( CNV-6036 ) into a VM to ssh into a VM from the web ui, e.g. via OpenShift Web Terminal (CNV-18480).

      User Stories

      • As a Developer, I like to manage a public key to login via ssh via UI, so that I can create multiple VMs in the UI without managing the secrets manually.

      Non-Requirements

      • List of things not included in this epic, to alleviate any doubt raised during the grooming process.

      Notes

      • Any additional details or decisions made/needed

      Done Checklist

      Who What Reference
      DEV Upstream roadmap issue (or individual upstream PRs) https://github.com/kubevirt-ui/kubevirt-plugin/pull/1358 
      https://github.com/kubevirt-ui/kubevirt-plugin/pull/1359 
      DEV Upstream documentation merged N/A
      DEV gap doc updated N/A
      DEV Upgrade consideration N/A
      DEV CEE/PX summary presentation N/A
      QE Test plans in Polarion Authorized SSH Key Management
      QE Automated tests merged PR merged
      DOC Downstream documentation merged https://github.com/openshift/openshift-docs/pull/63313

              aturgema Aviv Turgeman
              dholler@redhat.com Dominik Holler
              Leon Kladnitsky Leon Kladnitsky
              Votes:
              0 Vote for this issue
              Watchers:
              5 Start watching this issue

                Created:
                Updated:
                Resolved: