keys
Paths to SSH server (host) private keys or certificates (with associated keys). Paths are relative to application installation directory.
Arguments such as password
can be enclosed in double quotes ("
). Use backslash (\
) to escape other inner double quotes and backslashes.
# example
keys:
# Path to a key file
- Z:\keys\ed25519.key
# Path to an encrypted key file.
- Z:\keys\ed25519.key; password="The \"strongest\" password"
# Path to a PKCS#12 certificate
- Z:\keys\cert.pfx
# Path to a certificate file with an associated key file.
- Z:\keys\rsa_cert.crt; key=Z:\keys\rsa.key
# Path to the certificate store using a thumbprint
- Cert:\CurrentUser\My\4110908f77c64c0edfc2de6273bfa9a98a9c5ce5
# Path to the certificate store using CN and CA
- Cert:\CurrentUser\My\example.com; CA=mycertauthority.com
# All private keys from a directory (not recommended)
- Z:\keys
Path syntax
Private key file path:
<path> [; password="<password>"]
password
: 2.10.0+ password to decrypt the key file. If not specified, the key file is assumed to be unencrypted.
2.10.0+ Certificate file path:
<path> [; key=<key path>] [; password=<password>]
key
: path to a private key file associated with the certificate. If not specified, the certificate file is assumed to contain the private key.password
: password to decrypt the certificate file. If not specified, the certificate file is assumed to be unencrypted.
2.10.0+ Certificate store path:
cert:\<location>\<store>\<CN, SAN or thumbprint> [; thumbprint=<hex thumbprint>] [; CA=<CN of CA>] [; root=<CN or cert root>]
location
can beCurrentUser
orLocalMachine
store
can be e.g.My
,Root
,CA
, etc.CN, SAN or thumbprint
can be either of:- Common Name (CN), e.g.
example.com
- Subject Alternate Name (SAN), e.g.
example.org
- Thumbprint in hexadecimal format, e.g.
4110908f77c64c0edfc2de6273bfa9a98a9c5ce5
*
to match any certificate
- Common Name (CN), e.g.
Supported file formats
Private key formats:
- PKCS #8 (RFC 5208)
- OpenSSH/OpenSSL (SSLeay)
- New OpenSSH
- PuTTY
.ppk
Certificate formats:
- PKCS #12 (
.pfx
,.p12
) - DER-encoded X.509 (
.cer
,.crt
,.der
,.pem
)
Key generation
Server keys are generated by the installer and stored in <config root>/keys
directory, usually C:\ProgramData\Rebex\BuruSftp\keys
.
Keys can be also created manually using burusftp keygen
or burusftp init
command or any third-party tool, such as ssh-keygen
, openssl genpkey
or PuTTYgen
.
Remarks
When keys
section is missing, then keys will be searched for in the following locations:
<config root>/keys
(see configuration files for more details)<application root>/keys