Skip to content

Reminder to use an RSA key #57

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 2 commits into from
Jun 24, 2024
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
7 changes: 5 additions & 2 deletions README.rst
Original file line number Diff line number Diff line change
Expand Up @@ -62,15 +62,18 @@ Initialise Terraform:

terraform init

Generate an SSH keypair. The public key will be registered in OpenStack as a
Generate an SSH keypair. Note that `ED25519 keys are not currently supported by RHEL
<https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html-single/securing_networks/index#making-openssh-more-secure_assembly_using-secure-communications-between-two-systems-with-openssh>`__
when using the FIPS security standard (as enabled by the CIS benchmark hardening
scripts in kayobe-config). The public key will be registered in OpenStack as a
keypair and authorised by the instances deployed by Terraform. The private and
public keys will be transferred to the Ansible control host to allow it to
connect to the other hosts. Note that password-protected keys are not currently
supported.

.. code-block:: console

ssh-keygen -f id_rsa -N ''
ssh-keygen -t rsa -f id_rsa -N ''

Create an OpenStack clouds.yaml file with your credentials to access an
OpenStack cloud. Alternatively, download and source an openrc file from Horizon.
Expand Down