ssh-keygen -t ed25519
\n ssh-keygen -t rsa -b 4096
\n \n Location\n | \n\n Name\n | \n\n Type\n | \n\n Required\n | \n\n Description\n | \n
---|---|---|---|---|
\n BODY\n | \n\n key\n | \n\n String\n | \n\n TRUE\n | \n\n Key id used to login\n | \n
\n BODY\n | \n\n accessKey\n | \n\n String\n | \n\n TRUE\n | \n\n Access key used to login\n | \n
\n BODY\n | \n\n requestEpochTime\n | \n\n Integer\n | \n\n TRUE\n | \n\n Current epoch time of request\n | \n
\n HEADER\n | \n\n x-signature\n | \n\n String\n | \n\n TRUE\n | \n\n The calculated RSA/SSH signature for the message body request.\n *For RSA use SHA256 hash.\n | \n
import time\nimport requests\nimport base64\nimport json\nfrom cryptography.hazmat.primitives import serialization\n\nmessage_body = str(json.dumps({\n 'key': 'YOUR_KEY',\n 'accessKey': 'YOUR_ACCESS_CODE',\n 'requestEpochTime': round(time.time())\n}))\n\nwith open('your-private-open-ssh-key-file', mode='rb') as private_file:\n key_data = private_file.read()\nprivate_key = serialization.load_ssh_private_key(key_data, 'Passphrase or None')\n\n\nsignature = private_key.sign(bytes(message_body, 'utf-8'))\nbase_64_signature = base64.b64encode(signature).decode('utf-8')\n\nresponse = requests.post(\n 'http://localhost:8000/auth/accessKey/',\n headers={\n 'x-signature': base_64_signature\n },\n data=message_body)\n\nprint(response.json())
\n import time\nimport requests\nimport base64\nimport json\nfrom cryptography.hazmat.primitives import hashes, serialization\nfrom cryptography.hazmat.primitives.asymmetric import padding\n\ncurrentEpochTime = round(time.time())\nmessage_body = str(json.dumps({\n 'key': 'YOUR_KEY',\n 'accessKey': 'YOUR_ACCESS_CODE',\n 'requestEpochTime': round(time.time())\n}))\n\nwith open('your-private-rsa-key-file', mode='rb') as private_file:\n key_data = private_file.read()\nprivate_key = serialization.load_pem_private_key(key_data, 'passphrase or None')\n\nsignature = private_key.sign(\n bytes(message_body, 'utf-8'),\n padding.PSS(\n mgf=padding.MGF1(hashes.SHA256()),\n salt_length=padding.PSS.MAX_LENGTH\n ),\n hashes.SHA256()\n)\nbase_64_signature = base64.b64encode(signature).decode('utf-8')\nresponse = requests.post(\n '{{ globalEnv.baseUrl }}/auth/accessKey/',\n headers={\n 'x-signature': base_64_signature\n },\n data=message_body)\n\nprint(response.json())
\n Key Id | \n{{ keyId }} | \n
---|---|
Access Key | \n{{ accessKey }} | \n
\n {{ error }}\n
\n\n {{ error }}\n
\n