POST SSH Users Access

The POST /SSHClosed The SSH (secure shell) protocol provides for secure connections between computers. It provides several options for authentication, including public key, and protects the communications with strong encryption./Users/Access method is used to create a mapping of one or more Linux logons to a Keyfactor Command user or service account. This method returns HTTP 200 OK on a success with the details of the user to logon mapping, if any.

Tip:  The following permissions (see Security Overview) are required to use this feature:

SSH: ServerAdmin OR
SSH: EnterpriseAdmin

SSH actions are affected by ownership on the server group with which user to logon mappings are associated and limited for users with only the ServerAdmin role. For more information, see SSH Permissions in the Keyfactor Command Reference Guide.

Tip:  Before creating a logon to user mapping, be sure that you have switched the server to which you will add your mapping (or its server group) to inventory and publish policy mode so that the key for the user will be published to the server. If the server is in inventory only mode and you add a mapping for it in Keyfactor Command, the mapping will appear in Keyfactor Command only and the key for the user will not be published out to the server.

Table 567: POST SSH Users Access Input Parameters

Name In Description
ID Body

Required. An integer indicating the Keyfactor Command reference ID of the SSH user.

Use the GET /SSH/Users method (see GET SSH Users) to retrieve a list of all the SSH users to determine the user's ID.

LogonIds Body

An array of Keyfactor Command reference IDs for the Linux logons to map to the user to cause the user's SSH public keyClosed In asymmetric cryptography, public keys are used together in a key pair with a private key. The private key is retained by the key's creator while the public key is widely distributed to any user or target needing to interact with the holder of the private key. to be published out to the Linux servers on which those logons reside.

These are provided in the following format:

[12,27,39]

Use the GET /SSH/Logons method (see GET SSH Logons) to retrieve a list of all the SSH logons to determine the logon's ID(s).

Important:  Logon IDs you provide here replace any existing logon IDs associated with the user. To avoid accidentally removing access for users, check existing logons for the user (see GET SSH Users) before updating and provide both existing and new logon IDs.

Table 568: POST SSH Users Access Response Data

Name

Description

Id

An integer indicating the Keyfactor Command reference ID of the SSH user.

Key

An array containing information about the key for the user. ClosedShow key details.

Username A string indicating the full username of the user or service account. For a user account, the username appears in DOMAIN\\username format (e.g. KEYEXAMPLE\\jsmith). For a service account, the username is made up of the user name and ClientHostname entered when the service account is created (e.g. myapp@appsrvr75).
Access An array containing information about the Linux logons mapped to the user. ClosedShow Linux logon mapping details.
IsGroup A Boolean indicating whether the user is an Active Directory group (true) or not (false).