Each user in Moss (admin or developer) can add as many public SSH keys as needed. Moss may upload these keys onto your servers so that you can log into them via SSH or transfer files using SCP and SFTP. If you're not sure how SSH keys really work, please read first this introduction.

Your personal keys

To manage your public SSH keys in Moss, either click the link you can find in the dashboard of any workspace or under your user profile:

In order to add a new key, click the 'Add' button you can find in the toolbar and provide the following inputs:

  • The content of your public ssh key file.
  • The name you'll use to identify this key in Moss (e.g. 'my-name@my-laptop'). Moss tries to suggest a name from the SSH key itself, but you can use whatever makes sense to you.

Finally, click the 'Add' button.

Manage the keys bound to users

Whenever you add a server in Moss, you may choose one of your keys to be automatically uploaded onto user moss  in such server.

At the 'Users' tab of the server you may upload or unbind public keys for every user. For every public key uploaded onto a server user, you may authenticate as such user in SSH, SFTP and SCP by means of the corresponding private key that you own.

If you're a developer, then you only have access as a non-privileged user. If you're the admin of the organization, then you also have access as the privileged user moss .

Here you can see some examples to log into your server using SSH (where site and dev are non-privileged users created via Moss):

ssh moss@<server-ip-or-domain-name>
ssh site@<server-ip-or-domain-name>
ssh -i ~/.ssh/my_id_rsa dev@<server-ip-or-domain-name>
Did this answer your question?