Creating ssh key in a shared vault should generate warning
https://developer.1password.com/docs/ssh/manage-keys
"Stored in the Private or Personal vault of any of your 1Password accounts"
Attempting to generate or save an SSH key in other vault types should at least show a warning explaining the key won't be useable in CLI tooling...
This is an annoying limitation, one of the scenarios is creating keys that you want to share with a team member - while still retaining control of keys within 1password. I really hope this is reconsidered in a future update.
1Password Version: Not Provided
Extension Version: Not Provided
OS Version: Not Provided
Comments
-
A warning would be good, but I had a very good reason for creating an SSH in a shared vault today: we’re putting it in an external system. The only thing I’m not 100% happy about is that the way that it was exported doesn’t appear to be compatible with Jenkins (I think that the private key copy is different than what can be obtained with
op
).0 -
It’s not the key format. It’s Jenkins. It doesn’t know how to deal with ed25519 keys, yet.
0 -
@rodneyt @austin
I wanted to let you know that we're working on a solution that allows for the following:- Enable keys from other vaults than the Private vault.
- Create isolated setups with certain keys offered on a separate socket.
- Control the order in which keys are offered to SSH servers.
It would be great to get your feedback on our proposal, if you're (still) interested. You can do so by joining the #ssh-agent-config channel in our Slack workspace.
0