Links
Comment on page

SSH

There are three methods that can be used to authenticate a SHH connection:
  • Basic Auth
  • PEM file
  • Vault

Parameters

To connect via SSH you'll need to provide the following parameters (depending on your Authentication type, the requirements change):
Name
Description
Authentication Type
Name
This credential will be listed using the name you provide
All
Port
SSH port to connect to
All
Username
User to connect as. Defaults to logged in user
All
Password
Password to use for password authentication
Basic Auth
Proxy User
username for Proxy
Basic Auth
Proxy password
password for Proxy
Basic Auth
Private Key File
Contents of the Private Key File to use for authentication
PEM
Proxy Private Ket FileP
PEM file for proxy authentication
PEM
Vault URL
Vault
SSH Secret Path
Vault
Vault Role
Vault