Add Possibility to Restrict allowed SSH key technologies for GitLab.com
Everyone can contribute. Help move this issue forward while earning points, leveling up and collecting rewards.
Problem Statement
Currently, GitLab.com customers cannot restrict which SSH key technologies (like RSA) are allowed within their namespace, unlike self-managed instances where admins have this control. This creates a security concern for organizations wanting to enforce specific SSH key policies.
Current Behavior
- RSA SSH keys are allowed by default on GitLab.com
- No way to restrict SSH key technologies at namespace level
- No control over minimum key lengths for specific technologies
- Self-managed instances have these controls, but GitLab.com does not
Desired Behavior
Add functionality to restrict allowed SSH key technologies at the namespace level on GitLab.com, including:
- Ability to specify which SSH key technologies are allowed/disallowed
- Option to set minimum key lengths per technology
- Block git push/pull operations when a restricted key is used
Technical Considerations
- Direct blocking of SSH key creation based on group settings may be challenging
- Initial implementation could focus on blocking git operations when restricted keys are used
User Impact
This feature would primarily benefit customers on GitLab.com who require stricter security controls over SSH key usage within their organization.
Description was generated using AI
Edited by 🤖 GitLab Bot 🤖