Skip to content

Openssh-server

Logo

Description

Openssh-server is a sandboxed environment that allows ssh access without giving keys to the entire server. Giving ssh access via private key often means giving full access to the server. This container creates a limited and sandboxed environment that others can ssh into. The users only have access to the folders mapped and the processes running inside this container.

Image

linuxserver/openssh-server:latest

Categories

  • Managementutilityserver

Ports

  • 2222:2222/tcp

Volumes

ContainerBind
/config/opt/appdata/openssh-server

Environment Variables

NameLabelDefaultDescription
PUIDPUID1024for GroupID
PGIDPGID100for UserID
TZTZEurope/AmsterdamSpecify a timezone to use for example Europe/Amsterdam
PUBLIC_KEYPUBLIC_KEYyourpublickeyOptional ssh public key, which will automatically be added to authorized_keys.
PUBLIC_KEY_FILEPUBLIC_KEY_FILE/path/to/fileOptionally specify a file containing the public key (works with docker secrets).
PUBLIC_KEY_DIRPUBLIC_KEY_DIR/path/to/directory/containing/_only_/pubkeysOptionally specify a directory containing the public keys (works with docker secrets).
PUBLIC_KEY_URLPUBLIC_KEY_URLhttps://github.com/username.keysOptionally specify a URL containing the public key.
SUDO_ACCESSSUDO_ACCESSfalseSet to `true` to allow `linuxserver.io`, the ssh user, sudo access. Without `USER_PASSWORD` set, this will allow passwordless sudo access.
PASSWORD_ACCESSPASSWORD_ACCESSfalseSet to `true` to allow user/password ssh access. You will want to set `USER_PASSWORD` or `USER_PASSWORD_FILE` as well.
USER_PASSWORDUSER_PASSWORDpasswordOptionally set a sudo password for `linuxserver.io`, the ssh user. If this or `USER_PASSWORD_FILE` are not set but `SUDO_ACCESS` is set to true, the user will have passwordless sudo access.
USER_PASSWORD_FILEUSER_PASSWORD_FILE/path/to/fileOptionally specify a file that contains the password. This setting supersedes the `USER_PASSWORD` option (works with docker secrets).
USER_NAMEUSER_NAMElinuxserver.ioOptionally specify a user name (Default:`linuxserver.io`)

Labels

KeyValue
traefik.enabletrue
traefik.http.routers.openssh-server.ruleHost(`openssh-server.{$TRAEFIK_INGRESS_DOMAIN}`)
traefik.http.routers.openssh-server.entrypointshttps
traefik.http.services.openssh-server.loadbalancer.server.port2222
traefik.http.routers.openssh-server.tlstrue
traefik.http.routers.openssh-server.tls.certresolverdefault
traefik.http.routers.openssh-server.middlewarestraefik-forward-auth
mafl.enabletrue
mafl.titleOpenssh-server
mafl.descriptionOpenssh-server is a sandboxed environment that allows ssh access without giving keys to the entire server.
mafl.linkhttps://openssh-server.{$TRAEFIK_INGRESS_DOMAIN}
mafl.icon.wraptrue
mafl.icon.color#007acc
mafl.status.enabledtrue
mafl.status.interval60
mafl.groupManagementutilityserver
mafl.icon.urlhttps://upload.wikimedia.org/wikipedia/en/6/65/OpenSSH_logo.png

Licensed under the MIT License. Free for all use cases. For enterprise or academic support, please reach out to us.