Authentication Type | When to use | Secure? | Ease of setup | Additional tools |
---|---|---|---|---|
Personal access tokens | You need an easy to configure credential or need configurable access controls | Very secure (when using HTTPS) | Easy | Optional (Git credential managers) |
SSH | You already have SSH keys set up, or are on macOS or Linux | Very secure | Intermediate | Windows users will need the SSH tools included with Git for Windows |
Alternate credentials | You can't use personal access tokens or SSH | Least secure | Easy | See important information about alternate credentials |
ssh-keygen
to store the keys in a safe location so you can bypass the login prompt when connecting to your instances.ssh-keygen
utility prompts you to indicate where to store the key.ssh-keygen
utility prompts you for a passphrase.id_rsa
file in the .ssh
directory and is used to verify the public key you use belongs to the same Triton Compute Service account.Never share your private key with anyone! |
---|
id_rsa.pub
;file and is the key you upload to your Triton Compute Service account. You can save this key to the clipboard by running this:id_rsa
) does not match the public key stored with your Triton Compute Service account.triton
and CloudAPI as well as the triton-docker
commandline tool.