Skip to main content

Public Keys

Public Keys are cryptographic credentials used to enable secure, authenticated SFTP connections in UDMG. They are used in two distinct contexts:

  • When a partner connects to UDMG via SFTP, they authenticate using their SSH key pair. In this case, the partner previously shares their public key with UDMG Admins, who stores it in the partner's Account and uses it to validate their connections (Use Case 1).
  • When UDMG initiates an SFTP connection to an external server, it must verify the server's identity. This requires storing the public host key of the external (remote) SFTP server in UDMG (Use Case 2).
info

UDMG supports several key types and verifies that each key is in the correct format when saved. While these keys are stored securely, their values are not masked in the UDMG Admin UI. This is intentional and appropriate, as SSH Public Keys are non-sensitive by design and can be shared freely.

Use Cases

#Use CaseReferenced ByPurpose
1Account AuthenticationAccount → Local SFTP Server EndpointAllows a remote Account to authenticate to UDMG. Multiple authentication methods are supported, with key-only authentication used for automated or scripted transfers. This is referred to as passwordless.
2External SFTP Server Identity VerificationRemote SFTP Server EndpointVerifies the identity of the remote host (external SFTP server) to UDMG when UDMG is oriented as the SFTP client.

Account Authentication

When an Account connects to a Local SFTP Server Endpoint, it must provide a Public Key if the Endpoint's Authentication Method is configured as either Public Key, Password or Public Key, or Password and Public Key.

Implementation

  1. An SSH key pair is generated outside of UDMG (e.g., by your business partner) and the public key from that pair is shared with your organization.
  2. A new Credential (with Type: Public Key) is added on the Credentials page with the public key from Step 1.
  3. A new Account is created on the Accounts page, and the Public Key Credential created in Step 2 is selected in the Account's Credentials field.
  4. The Local SFTP Server Endpoint to which the Account is associated (by nature of Account Group and Pipeline assignment) has its Authentication Method set to Public Key, Password or Public Key, or Password and Public Key.
  5. UDMG references and uses the public key when a partner attempts to authenticate over SFTP.
info
  • An Account can have multiple Public Keys assigned.
  • In the above example, a new Credential and Account were created, but this process also applies to modifying existing Configuration Items.

External SFTP Server Identity Verification

When UDMG acts as an SFTP client connecting to a remote SFTP server, it must verify the identity of the remote host before establishing a secure connection. This is achieved by comparing the host key sent by the remote SFTP server during the SSH handshake with the Public Key stored in the corresponding Remote SFTP Server Endpoint.

info

This identity verification step is distinct from authentication. If the remote server also requires UDMG to authenticate using a key, you must add a Username and Key or Username, Password, and Key Credential to the Pipeline.

Implementation

  1. A public key representing the Host Key of the external SFTP server is generated outside of UDMG (e.g., by your business partner) and shared with your organization.
  2. A new Credential (with Type: Public Key) is added on the Credentials page with the public key from Step 1.
  3. The Public Key is associated with the Remote SFTP Server Endpoint on the Endpoints page using the Credentials Name (Host Key) field.
  4. When UDMG connects to the external SFTP server, the server sends a copy of its Host Key, which is compared to the one stored locally, verifying the identity of the external SFTP server.
  5. UDMG connects to the external SFTP server using the connection details stored in the Remote SFTP Server Endpoint and associated Pipeline.
info

Only one Public Key can be assigned per Remote SFTP Server Endpoint.

Adding a Public Key

To add a Key Credential, follow these steps:

  1. From the Sidebar, click Configuration > Credentials.
  2. Click Add Credential.
  3. Select Public Key as the Credential Type.
  4. Enter an identifying Name and Description, and optionally Valid From and Valid To dates.
  5. Enter or paste in the Public Key obtained from your partner (or from your organization, if applicable).
  6. Click Add.
info

Each key must be properly created to be referenced by other Configuration Items. UDMG validates keys for format, but not for usage.

Field Descriptions

The following table lists all fields that can be completed when adding (or editing) a Public Key:

NameDescriptionSpecificationsRequired
Type

Type of Credential.

Select: Public Key.

Cannot be modified after creation.Yes
NameThe name of the Public Key.Yes
DescriptionThe description of the Public Key.No
Valid FromDate when the Credential becomes valid.Cannot be later than Valid To date.No
Valid To

Date when the Credential becomes invalid.

info

UDMG does not use or check the dates provided. The dates entered are only meant to help Users keep track of expiration dates.

Cannot be earlier than Valid From date.No
KeyRaw cryptographic data of the Public Key. Key metadata is parsed automatically.
  • Must be entered in one line.
  • Values are visible in the UDMG Admin UI.
Yes

Editing a Public Key

To edit a Public Key, follow these steps:

  1. From the Sidebar, select Configuration > Credentials.
  2. Click the Name of the Public Key you want to edit.
  3. Click the Edit button above the details to edit the specific fields.
  4. Edit details for the Public Key, using the Field Descriptions table as a guide.
  5. Click Update.

Managing a Public Key

Viewing Public Key Details

To view the details of a Public Key, follow these steps:

  1. From the Sidebar, click Configuration > Credentials.
  2. Click the Name of the Public Key you want to view.

Public Key Metadata

Public Key details include all parameters given in the Field Descriptions table above, plus the following read-only metadata:

NameDescription
UUIDUniversally Unique Identifier of this Public Key.
EnabledCredentials Enabled status. If enabled, field is set to True.
VersionVersion number of the latest configuration of the Credential, including changes to the Enabled status.
CreatedDate and time this Account Group was created.
UpdatedDate and time this Account Group was last updated.
AlgorithmThe cryptographic method used to generate the key (RSA, DSA, or ECC).
BitsThe key length that determines its strength against brute force attacks.
CommentsOptional administrative notes for identification or documentation purposes.
Fingerprint (MD5)A legacy hash checksum that provides a unique identifier for the key.
Fingerprint (SHA256)A modern, more secure hash that uniquely identifies the key.
Authorized KeysThe formatted text string is ready to be copied into SSH server configuration files.

Enabling and Disabling Public Keys

Public Keys can be Enabled or Disabled to control their active status and ability to participate in file transfers. The status is defaulted to Enabled and can be changed after creation.

  • Enabled (default): The Public Key is active and available for use.
  • Disabled: The Public Key is not active and unavailable for use.

To enable or disable a Public Key, follow these steps:

  1. From the Sidebar, click Configuration > Credentials.
  2. Click the Name of the Public Key you want to enable/disable.
  3. Click the Enable or Disable button above the Public Key details, depending on the current status.

Deleting a Public Key

To delete a Credential, follow these steps:

  1. From the Sidebar, click Configuration > Credentials.
  2. Click the Name of the Credential you want to delete.
  3. Click the Delete button above the Credential details.
  4. You will be asked to confirm the deletion. Click Delete.
warning

If a Credential is currently assigned to a Configuration Item (Endpoint, Pipeline, Account) or LDAP, then it cannot be deleted. You must first remove the Credential from the specific Configuration Item(s) it is assigned to, then go back to the Credentials page to delete the Credential.