Compute Engine uses key-based SSH authentication to establish connections to all Linux virtual machine (VM) instances. You can optionally enable SSH for Windows VMs. By default, passwords aren't configured for local users on Linux VMs.
Before you can connect to a VM, several configurations must be performed. If you use the Google Cloud console or the Google Cloud CLI to connect to your VMs, Compute Engine performs these configurations on your behalf. Compute Engine performs different configurations depending on which tool you use to connect and whether you manage access to VMs through metadata or OS Login. OS Login is available only for Linux VMs.
Metadata-managed SSH connections
By default, Compute Engine uses custom project and/or instance metadata to configure SSH keys and to manage SSH access. All Windows VMs use metadata to manage SSH keys, while Linux VMs can use metadata keys or OS Login. If you use OS Login, metadata SSH keys are disabled.Click each tab to learn more about the configurations Compute Engine performs before it grants SSH connections when you use the Google Cloud console, the gcloud CLI, or third party tools to connect to VMs. If you connect to VMs without using the Google Cloud console or the gcloud CLI, you must perform some configurations yourself.
Console
- You use the SSH button in the Google Cloud console to connect to your VM.
- Compute Engine sets a username and creates an ephemeral SSH key pair with the
following configuration:
- Your username is set as the username in your Google Account. For example, if the email
address associated with your Google Account is
[email protected]
, then your username iscloudysanfrancisco
. - Your public and private SSH keys are stored in your browser session.
- Your SSH key has an expiry of five minutes. Five minutes after Compute Engine creates the key, you can't use the SSH key to connect to the VM anymore.
- Your username is set as the username in your Google Account. For example, if the email
address associated with your Google Account is
- Compute Engine uploads the public SSH key and username to metadata.
- Compute Engine retrieves the SSH key and username from metadata, creates a
user account with the username, and on Linux VMs, stores the public key in your
user's
~/.ssh/authorized_keys
file on the VM. On Windows VMs, Compute Engine doesn't store the public key on the VM. - Compute Engine grants your connection.
gcloud
- You use the
gcloud compute ssh
command to connect to your VM. - Compute Engine sets a username and creates a persistent SSH key pair with the
following configurations:
- Your username is set as the username in your local machine.
- Your public SSH key is stored in project metadata. If Compute Engine can't store the SSH
key in project metadata, for example, because
block-project-ssh-keys
is set toTRUE
, Compute Engine stores the SSH key in instance metadata. - Your private SSH key is stored on your local machine.
- Your SSH key doesn't have an expiry. It is used for all future SSH connections you make, unless you configure a new key.
- Your username is set as the username in your local machine.
- Compute Engine uploads the public SSH key and username to metadata.
- Compute Engine retrieves the SSH key and username from metadata, creates a
user account with the username, and on Linux VMs, stores the public key in your
user's
~/.ssh/authorized_keys
file on the VM. On Windows VMs, Compute Engine doesn't store the public key on the VM. - Compute Engine grants your connection.
Third party tools
- You create an SSH key pair and username. See Create SSH keys for details.
- You upload the public key and username to metadata. See Add SSH keys to VMs that use metadata-based SSH keys for details.
- You connect to the VM.
- Compute Engine retrieves the SSH key and username from metadata, creates a
user account with the username, and on Linux VMs, stores the public key in your
user's
~/.ssh/authorized_keys
file on the VM. On Windows VMs, Compute Engine doesn't store the public key on the VM. - Compute Engine grants your connection.
OS Login-managed SSH connections
When you set OS Login metadata, Compute Engine deletes the VM's
authorized_keys
files and no longer accepts connections from SSH keys that are
stored in project or instance metadata.
Click each tab to learn more about the configurations Compute Engine performs before it grants SSH connections when you use the Google Cloud console, the gcloud CLI, or third party tools to connect to VMs. If you connect to VMs without using the Google Cloud console or the gcloud CLI, you must perform some configurations yourself.
Console
- You use the SSH button in the Google Cloud console to connect to your VM.
- Compute Engine sets a username and creates an ephemeral SSH key pair with the
following configuration:
- Your username is the username set by your organization's Cloud Identity or
Google Workspace administrator. If your organization hasn't configured a username for you, or
your project doesn't belong to an organization, Compute Engine uses your Google Account
email, in the following format:
For example, if the email associated with your Google Account isUSERNAME_DOMAIN_SUFFIX
[email protected]
, then your generated username iscloudysanfrancisco_gmail_com
. - Your public SSH key is stored in your browser session and in your Google Account.
- Your private SSH key is stored in your browser session.
- Your SSH key has an expiry of three minutes. Three minutes after Compute Engine creates the key, you can't use the SSH key to connect to the VM anymore.
- Your username is the username set by your organization's Cloud Identity or
Google Workspace administrator. If your organization hasn't configured a username for you, or
your project doesn't belong to an organization, Compute Engine uses your Google Account
email, in the following format:
- Compute Engine resolves your provided username to your OS Login account in the VM using NSS service modules.
- Compute Engine performs IAM authorization using the
AuthorizedKeysCommand
, to ensure you have the required permissions to connect. - The
AuthorizedKeysCommand
retrieves the SSH key from your user account to provide it to OpenSSH in the VM. - Compute Engine grants your connection.
gcloud
- You use the
gcloud compute ssh
command to connect to your VM. - Compute Engine sets a username and creates a persistent SSH key pair with the
following configurations:
- Your username is the username set by your organization's Cloud Identity or
Google Workspace administrator. If your organization hasn't configured a
username for you, Compute Engine uses your Google Account email, in the following format:
For example, if the email associated with your Google Account isUSERNAME_DOMAIN_SUFFIX
[email protected]
, then your generated username iscloudysanfrancisco_gmail_com
. - Your public SSH key is stored in your Google Account.
- Your private SSH key is stored on your local machine in the
google_compute_engine
file. - Your SSH key doesn't have an expiry. It is used for all future SSH connections you make, unless you configure a new key.
- Your username is the username set by your organization's Cloud Identity or
Google Workspace administrator. If your organization hasn't configured a
username for you, Compute Engine uses your Google Account email, in the following format:
- Compute Engine resolves your provided username to your OS Login account in the VM using NSS service modules.
- Compute Engine performs IAM authorization using the
AuthorizedKeysCommand
, to ensure you have the required permissions to connect. - The
AuthorizedKeysCommand
retrieves the SSH key from your user account to provide it to OpenSSH in the VM. - Compute Engine grants your connection.
Third party tools
- You create an SSH key pair. See Create SSH keys for details.
- You upload your public SSH key to your OS Login profile. See Add keys to VMs that use OS Login for details.
- Compute Engine stores your key in your Google Account.
- Compute Engine configures your username in the default format:
For example, if the email associated with your Google Account isUSERNAME_DOMAIN_SUFFIX
[email protected]
, then your generated username iscloudysanfrancisco_gmail_com
.
AuthorizedKeysCommand
, to ensure
you have the required permissions to connect.AuthorizedKeysCommand
retrieves the SSH key from your user account to provide it to OpenSSH in the
VM.What's next?
- Learn more about the benefits of using OS Login.
- Set up OS Login to manage access to your VMs.
- Learn how to Manage SSH keys in metadata, if you don't want to use OS Login.
- Learn how to Connect to VMs.
- To find methods and tools for diagnosing and resolving failed SSH connections, see Troubleshooting SSH.