SkillAgentSearch skills...

Opkssh

opkssh (OpenPubkey SSH)

Install / Use

/learn @openpubkey/Opkssh
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

opkssh (OpenPubkey SSH)

Go Coverage

opkssh is a tool which enables ssh to be used with OpenID Connect allowing SSH access to be managed via identities like alice@example.com instead of long-lived SSH keys. It does not replace SSH, but instead generates SSH public keys containing PK Tokens and configures sshd to verify them. These PK Tokens contain standard OpenID Connect ID Tokens. This protocol builds on the OpenPubkey which adds user public keys to OpenID Connect without breaking compatibility with existing OpenID Provider.

Currently opkssh is compatible with Google, Microsoft/Azure, Gitlab, hello.dev, and Authelia OpenID Providers (OP). See below for the entire list. If you have a gmail, microsoft or a gitlab account you can ssh with that account.

To ssh with opkssh you first need to download the opkssh binary and then run:

opkssh login

This opens a browser window where you can authenticate to your OpenID Provider. This will generate an SSH key in ~/.ssh/id_ecdsa which contains your OpenID Connect identity. Then you can ssh under this identity to any ssh server which is configured to use opkssh to authenticate users using their OpenID Connect identities.

ssh user@example.com

OpenPubkey Mailing List

For updates and announcements join the OpenPubkey mailing list.

Getting Started

To ssh with opkssh, Alice first needs to install opkssh using homebrew or manually downloading the binary.

Homebrew Install (macOS)

To install with homebrew run:

brew tap openpubkey/opkssh
brew install opkssh

Winget Install (Windows)

To install with winget run:

winget install openpubkey.opkssh

Chocolatey Install (Windows)

To install with Chocolatey run:

choco install opkssh -y

Nix Install

Use the opkssh nixpkg as normal, or test it via:

nix-shell -p opkssh

Manual Install (Windows, Linux, macOS)

To install manually, download the opkssh binary and run it:

| | Download URL | |-----------|--------------| |🐧 Linux (x86_64) | github.com/openpubkey/opkssh/releases/latest/download/opkssh-linux-amd64 | |🐧 Linux (ARM64/aarch64) | github.com/openpubkey/opkssh/releases/latest/download/opkssh-linux-arm64 | |🍎 macOS (x86_64) | github.com/openpubkey/opkssh/releases/latest/download/opkssh-osx-amd64 | |🍎 macOS (ARM64/aarch64) | github.com/openpubkey/opkssh/releases/latest/download/opkssh-osx-arm64 | | ⊞ Win | github.com/openpubkey/opkssh/releases/latest/download/opkssh-windows-amd64.exe |

To install on Windows run:

curl https://github.com/openpubkey/opkssh/releases/latest/download/opkssh-windows-amd64.exe -o opkssh.exe

To install on macOS run:

curl -L https://github.com/openpubkey/opkssh/releases/latest/download/opkssh-osx-amd64 -o opkssh; chmod +x opkssh

To install on linux, run:

curl -L https://github.com/openpubkey/opkssh/releases/latest/download/opkssh-linux-amd64 -o opkssh; chmod +x opkssh

or for ARM

curl -L https://github.com/openpubkey/opkssh/releases/latest/download/opkssh-linux-arm64 -o opkssh; chmod +x opkssh

SSHing with opkssh

After downloading opkssh run:

opkssh login

This opens a browser window to select which OpenID Provider you want to authenticate against. After successfully authenticating opkssh generates an SSH public key in ~/.ssh/id_ecdsa which contains your PK Token. By default this ssh key expires after 24 hours and you must run opkssh login to generate a new ssh key.

Since your PK Token has been saved as an SSH key you can SSH as normal:

ssh root@example.com

This works because SSH sends the public key written by opkssh in ~/.ssh/id_ecdsa to the server and sshd running on the server will send the public key to the opkssh command to verify. This also works for other protocols that build on ssh like sftp or ssh tunnels.

sftp root@example.com

Custom key name

<details> <summary>Instructions</summary>

SSH command

Tell opkssh to store the name the key-pair opkssh_server_group1

opkssh login -i opkssh_server_group1

Tell ssh to use the generated key pair.

ssh -o "IdentitiesOnly=yes" -i ~/.ssh/opkssh_server_group1 root@example.com

We recommend specifying -o "IdentitiesOnly=yes" as it tells ssh to only use the provided key. Otherwise ssh will cycle through other keys in ~/.ssh first and may not get to the specified ones. Servers are configured to only allow 6 attempts by default the config key is MaxAuthTries 6.

</details>

Installing on a Server

To configure a linux server to use opkssh simply run (with root level privileges):

wget -qO- "https://raw.githubusercontent.com/openpubkey/opkssh/main/scripts/install-linux.sh" | sudo bash

This downloads the opkssh binary, installs it as /usr/local/bin/opkssh, and then configures ssh to use opkssh as an additional authentication mechanism.

To allow a user, alice@gmail.com, to ssh to your server as root, run:

sudo opkssh add root alice@gmail.com google

To allow a group, ssh-users, to ssh to your server as root, run:

sudo opkssh add root oidc:groups:ssh-users google

We can also enforce policy on custom claims. For instance to require that root access is only granted to users whose ID Token has a claim https://acme.com/groups with the value ssh-users run:

sudo opkssh add root oidc:\"https://acme.com/groups\":ssh-users google

which will add that line to your OPKSSH policy file.

How it works

We use two features of SSH to make this work. First we leverage the fact that SSH public keys can be SSH certificates and SSH Certificates support arbitrary extensions. This allows us to smuggle your PK Token, which includes your ID Token, into the SSH authentication protocol via an extension field of the SSH certificate. Second, we use the AuthorizedKeysCommand configuration option in sshd_config (see sshd_config manpage) so that the SSH server will send the SSH certificate to an installed program that knows how to verify PK Tokens.

What is supported

Client support

| OS | Supported | Tested | Version Tested | | --------- | -------- | ------- | ----------------------- | | Linux | ✅ | ✅ | Ubuntu 24.04.1 LTS | | macOS | ✅ | ✅ | macOS 15.3.2 (Sequoia) | | Windows11 | ✅ | ✅ | Windows 11 |

Server support

| OS | Supported | Tested | Version Tested | Possible Future Support | | ---------------- | -------- | ------ | ---------------------- | ----------------------- | | Linux | ✅ | ✅ | Ubuntu 24.04.1 LTS | - | | Linux | ✅ | ✅ | Centos 9 | - | | Linux | ✅ | ✅ | Arch Linux | - | | Linux | ✅ | ✅ | opensuse leap 16 | - | | macOS | ❌ | ❌ | - | Likely | | Windows11 | ❌ | ❌ | - | Likely |

Server Configuration

All opkssh configuration files are space delimited and live on the server. Below we discuss our basic policy system, to read how to configure complex policies rules see our documentation on our policy plugin system. Using the policy plugin system you can enforce any policy rule that be computed on a Turing Machine.

/etc/opk/providers

/etc/opk/providers contains a list of allowed OPs (OpenID Providers), a.k.a. IDPs. This file functions as an access control list that enables admins to determine the OpenID Providers and Client IDs they wish to rely on.

  • Column 1: Issuer URI of the OP
  • Column 2: Client-ID, the audience claim in the ID Token
  • Column 3: Expiration policy, options are:
    • 12h - user's ssh public key expires after 12 hours,
    • 24h - user's ssh public key expires after 24 hours,
    • 48h - user's ssh public key expires after 48 hours,
    • 1week - user's ssh public key expires after 1 week,
    • oidc - user's ssh public key expires when the ID Token expires
    • oidc-refreshed - user's ssh public key expires when their refreshed ID Token expires.

By default we use 24h as it requires that the user authenticate to their OP once a day. Most OPs expire ID Tokens every one to two hours, so if oidc the user will have to sign multiple times a day. oidc-refreshed is supported but complex and not currently recommended unless you know what you are doing.

The default values for /etc/opk/providers are:

# Issuer Client-ID expiration-policy
https://accounts.google.com 206584157355-7cbe4s640tvm7naoludob4ut1emii7sf.apps.googleusercontent.com 24h
https://login.microsoftonline.com/9188040d-6c67-4c5b-b112-36a304b6
View on GitHub
GitHub Stars1.9k
CategoryDevelopment
Updated8m ago
Forks91

Languages

Go

Security Score

100/100

Audited on Mar 24, 2026

No findings