Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Device compromise:

    1. A device upon which you store your ssh key files has been compromised, due to malware, malicious actors gaining access to log in as you on your device, or malicious actors gaining access to data stored on your device.

  2. Data compromise:

    1. Your key files were copied or accessed by someone other than yourself

    2. You backed up your key files to a location outside your device that was subject to a compromise

  3. Following good security practices:

    1. It is recommended that ssh keys be rotated as part of a remediation process to ensure any keys that may have been compromised since their initial generation cease to be usable. ARCC recommends rotating your keys every 6 months (similar to requiring password changes at regular intervals).

...

Click the download button. This will download your new key files to the local device from you’re currently accessing OnDemand.

...

Replacing SSH Keys on your Device

Before configuring your new ssh keys on your devices (usually this is your main workstation or laptop) you must remove your old keys.
As always, ARCC recommends only setting up SSH authentication keys on devices you have sole access to, and not on shared devices. If you do set up an ssh key for authentication on a shared device, only do so on computers where individuals log into separate, individual profiles on the computer. If you’re not sure how to determine this, contact arcc-help@uwyo.edu

Expand the section associated with your specific device OS and follow directions to remove your old SSH keys before replacing them with your new keys.

...