-
-
Notifications
You must be signed in to change notification settings - Fork 312
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Restrict public keys to tcp-aliases #231
Comments
Hey @giezi, Unfortunately, this is not supported by sish (yet). I've been trying to think about an ACL system and how best to manage it. I'm trying to keep sish as stateless as possible, but have some ideas on how this might be supported in the future. Make sure to stay tuned and keep following the project! As an aside, if you're using sish for work and are making money from it (totally and completely permissible by the project's license) consider sponsoring the project! Not mandatory by any means, just helps allow me to assign more time to the project and keep adding awesome features :) Best, |
Hi @antoniomika Many thanks for the fast feedback :) Best regards |
Asking for password not sure which password and where to get it |
I have the same problem... :( |
The issue the other two above had is because @chmuche your issue might be due to how the public keys file is parsed by sish |
Hi there
Thanks for the great project!
Just a question: Is it possible to restrict TCP aliases to specific public keys with a matching pattern option (like KEYNAME1-* is allowed to access all TCPALIAS1-* )?
Usecase: allow only specific public keys from a customer to access specific tcp-aliases (with a wildcard option)
Thanks a lot,
Reto
The text was updated successfully, but these errors were encountered: