Opkssh
opkssh (OpenPubkey SSH)
Install / Use
/learn @openpubkey/OpksshREADME
opkssh (OpenPubkey SSH)
opkssh is a tool which enables ssh to be used with OpenID Connect allowing SSH access to be managed via identities like alice@example.com instead of long-lived SSH keys.
It does not replace SSH, but instead generates SSH public keys containing PK Tokens and configures sshd to verify them. These PK Tokens contain standard OpenID Connect ID Tokens. This protocol builds on the OpenPubkey which adds user public keys to OpenID Connect without breaking compatibility with existing OpenID Provider.
Currently opkssh is compatible with Google, Microsoft/Azure, Gitlab, hello.dev, and Authelia OpenID Providers (OP). See below for the entire list. If you have a gmail, microsoft or a gitlab account you can ssh with that account.
To ssh with opkssh you first need to download the opkssh binary and then run:
opkssh login
This opens a browser window where you can authenticate to your OpenID Provider. This will generate an SSH key in ~/.ssh/id_ecdsa which contains your OpenID Connect identity.
Then you can ssh under this identity to any ssh server which is configured to use opkssh to authenticate users using their OpenID Connect identities.
ssh user@example.com
OpenPubkey Mailing List
For updates and announcements join the OpenPubkey mailing list.
Getting Started
To ssh with opkssh, Alice first needs to install opkssh using homebrew or manually downloading the binary.
Homebrew Install (macOS)
To install with homebrew run:
brew tap openpubkey/opkssh
brew install opkssh
Winget Install (Windows)
To install with winget run:
winget install openpubkey.opkssh
Chocolatey Install (Windows)
To install with Chocolatey run:
choco install opkssh -y
Nix Install
Use the opkssh nixpkg as normal, or test it via:
nix-shell -p opkssh
Manual Install (Windows, Linux, macOS)
To install manually, download the opkssh binary and run it:
| | Download URL | |-----------|--------------| |🐧 Linux (x86_64) | github.com/openpubkey/opkssh/releases/latest/download/opkssh-linux-amd64 | |🐧 Linux (ARM64/aarch64) | github.com/openpubkey/opkssh/releases/latest/download/opkssh-linux-arm64 | |🍎 macOS (x86_64) | github.com/openpubkey/opkssh/releases/latest/download/opkssh-osx-amd64 | |🍎 macOS (ARM64/aarch64) | github.com/openpubkey/opkssh/releases/latest/download/opkssh-osx-arm64 | | ⊞ Win | github.com/openpubkey/opkssh/releases/latest/download/opkssh-windows-amd64.exe |
To install on Windows run:
curl https://github.com/openpubkey/opkssh/releases/latest/download/opkssh-windows-amd64.exe -o opkssh.exe
To install on macOS run:
curl -L https://github.com/openpubkey/opkssh/releases/latest/download/opkssh-osx-amd64 -o opkssh; chmod +x opkssh
To install on linux, run:
curl -L https://github.com/openpubkey/opkssh/releases/latest/download/opkssh-linux-amd64 -o opkssh; chmod +x opkssh
or for ARM
curl -L https://github.com/openpubkey/opkssh/releases/latest/download/opkssh-linux-arm64 -o opkssh; chmod +x opkssh
SSHing with opkssh
After downloading opkssh run:
opkssh login
This opens a browser window to select which OpenID Provider you want to authenticate against.
After successfully authenticating opkssh generates an SSH public key in ~/.ssh/id_ecdsa which contains your PK Token.
By default this ssh key expires after 24 hours and you must run opkssh login to generate a new ssh key.
Since your PK Token has been saved as an SSH key you can SSH as normal:
ssh root@example.com
This works because SSH sends the public key written by opkssh in ~/.ssh/id_ecdsa to the server and sshd running on the server will send the public key to the opkssh command to verify. This also works for other protocols that build on ssh like sftp or ssh tunnels.
sftp root@example.com
Custom key name
<details> <summary>Instructions</summary>SSH command
Tell opkssh to store the name the key-pair opkssh_server_group1
opkssh login -i opkssh_server_group1
Tell ssh to use the generated key pair.
ssh -o "IdentitiesOnly=yes" -i ~/.ssh/opkssh_server_group1 root@example.com
We recommend specifying -o "IdentitiesOnly=yes" as it tells ssh to only use the provided key. Otherwise ssh will cycle through other keys in ~/.ssh first and may not get to the specified ones. Servers are configured to only allow 6 attempts by default the config key is MaxAuthTries 6.
Installing on a Server
To configure a linux server to use opkssh simply run (with root level privileges):
wget -qO- "https://raw.githubusercontent.com/openpubkey/opkssh/main/scripts/install-linux.sh" | sudo bash
This downloads the opkssh binary, installs it as /usr/local/bin/opkssh, and then configures ssh to use opkssh as an additional authentication mechanism.
To allow a user, alice@gmail.com, to ssh to your server as root, run:
sudo opkssh add root alice@gmail.com google
To allow a group, ssh-users, to ssh to your server as root, run:
sudo opkssh add root oidc:groups:ssh-users google
We can also enforce policy on custom claims.
For instance to require that root access is only granted to users whose ID Token has a claim https://acme.com/groups with the value ssh-users run:
sudo opkssh add root oidc:\"https://acme.com/groups\":ssh-users google
which will add that line to your OPKSSH policy file.
How it works
We use two features of SSH to make this work.
First we leverage the fact that SSH public keys can be SSH certificates and SSH Certificates support arbitrary extensions.
This allows us to smuggle your PK Token, which includes your ID Token, into the SSH authentication protocol via an extension field of the SSH certificate.
Second, we use the AuthorizedKeysCommand configuration option in sshd_config (see sshd_config manpage) so that the SSH server will send the SSH certificate to an installed program that knows how to verify PK Tokens.
What is supported
Client support
| OS | Supported | Tested | Version Tested | | --------- | -------- | ------- | ----------------------- | | Linux | ✅ | ✅ | Ubuntu 24.04.1 LTS | | macOS | ✅ | ✅ | macOS 15.3.2 (Sequoia) | | Windows11 | ✅ | ✅ | Windows 11 |
Server support
| OS | Supported | Tested | Version Tested | Possible Future Support | | ---------------- | -------- | ------ | ---------------------- | ----------------------- | | Linux | ✅ | ✅ | Ubuntu 24.04.1 LTS | - | | Linux | ✅ | ✅ | Centos 9 | - | | Linux | ✅ | ✅ | Arch Linux | - | | Linux | ✅ | ✅ | opensuse leap 16 | - | | macOS | ❌ | ❌ | - | Likely | | Windows11 | ❌ | ❌ | - | Likely |
Server Configuration
All opkssh configuration files are space delimited and live on the server. Below we discuss our basic policy system, to read how to configure complex policies rules see our documentation on our policy plugin system. Using the policy plugin system you can enforce any policy rule that be computed on a Turing Machine.
/etc/opk/providers
/etc/opk/providers contains a list of allowed OPs (OpenID Providers), a.k.a. IDPs.
This file functions as an access control list that enables admins to determine the OpenID Providers and Client IDs they wish to rely on.
- Column 1: Issuer URI of the OP
- Column 2: Client-ID, the audience claim in the ID Token
- Column 3: Expiration policy, options are:
12h- user's ssh public key expires after 12 hours,24h- user's ssh public key expires after 24 hours,48h- user's ssh public key expires after 48 hours,1week- user's ssh public key expires after 1 week,oidc- user's ssh public key expires when the ID Token expiresoidc-refreshed- user's ssh public key expires when their refreshed ID Token expires.
By default we use 24h as it requires that the user authenticate to their OP once a day. Most OPs expire ID Tokens every one to two hours, so if oidc the user will have to sign multiple times a day. oidc-refreshed is supported but complex and not currently recommended unless you know what you are doing.
The default values for /etc/opk/providers are:
# Issuer Client-ID expiration-policy
https://accounts.google.com 206584157355-7cbe4s640tvm7naoludob4ut1emii7sf.apps.googleusercontent.com 24h
https://login.microsoftonline.com/9188040d-6c67-4c5b-b112-36a304b6
