Introduced in 0.7.0
When pushing to Dokku, SSH key-based authorization is the preferred authentication method, for ease of use and increased security.
Users in Dokku are managed via the
~/dokku/.ssh/authorized_keys file. It is highly recommended that you follow the steps below to manage users on a Dokku server.
Users of older versions of Dokku may use the
sshcommand binary to manage keys instead of the
ssh-keys plugin. Please refer to the Dokku documentation for your version for more details.
Listing SSH keys
You can use the
ssh-keys:list command to show all configured SSH keys.
The output contains the following information:
- SSH Key Fingerprint.
- A comma separated list of SSH options under the
Introduced in 0.20.2
The keys for a specific user may be listed by specifying a second argument to the
The output format may be specified via the
--format flag. Supported values include
This can additionally be used to filter to keys for a particular user:
Adding SSH keys
You can add your public key to Dokku with the
ssh-keys:add command. The output will be the fingerprint of the SSH key:
KEY_NAME is the name you want to use to refer to this particular key. Including the word
admin in the name will grant the user privileges to add additional keys remotely.
KEY_NAME is a unique name which is used to identify public keys. Attempting to re-use a key name will result in an error. The SSH (Git) user is always
dokku, as this is the system user that the
dokku binary uses to perform all its actions.
Admin users and root can add keys remotely by specifying the
dokku bin on their
If you are using the Vagrant installation, you can also use the
make vagrant-acl-add target to add your public key to Dokku (it will use your host username as the
Removing SSH keys
As key names are unique, they can be used to remove a public SSH key.
An SSH Key can also be removed by fingerprint.
Scoping commands to specific users
Support for scoping commands to specific users can be added through plugins that take advantage of the user-auth plugin trigger to handle command authorization. See also the list of community-provided plugins.
Granting other Unix user accounts Dokku access
Any Unix user account which belongs to the
sudo Unix group can run Dokku. However, you may want to give them Dokku access but not full sudo privileges.
To allow other Unix user accounts to be able to run Dokku commands, without giving them full sudo access, modify your sudoers configuration.
visudo /etc/sudoers.d/dokku-users, or
visudo /etc/sudoers to add the following line: