Connect securely with SSH
Back to home
On this page
When you interact with a deployed environment, you need to guard your connection against unauthorized access. Use Secure Shell (SSH) to provide a secure channel.
You can securely log in to your deployed app to troubleshoot and read logs. And create a tunnel to export data through. And interact with your project through the CLI. All secured through SSH.
Connect to apps
To connect to an app securely with SSH, follow two steps.
1. Authenticate with the CLI
To authenticate with the CLI:
- Install the Platform.sh CLI.
- Run
platform login
. - In the open browser window, log in with your Platform.sh account credentials. (This webpage is encrypted with HTTPS, making it secure.)
- Authorize the CLI to use your account.
A certificate gets stored in your local SSH configuration. The certificate is automatically cycled every hour for a new certificate as long as your session is active.
If you are inactive for an extended period, your certificate expires and you are asked to login again the next time you use a command that requires authentication.
You are now ready to run CLI commands and connect to an environment.
2. Connect to an app with SSH
To access an app in a given environment via the CLI, run the following command:
platform ssh --project PROJECT_ID --environment ENVIRONMENT_NAME --app APPLICATION_NAME
Replace each of PROJECT_ID
, ENVIRONMENT_NAME
, and APPLICATION_NAME
with the values you want to access.
To find these values in the Console,
navigate to the environment you want to access and click SSH in the top right-hand corner.
Alternatively, just run platform ssh
and select the values from each list presented to you.
Once you’ve connected, you get a welcome message detailing which environment you’re connected to.
Now you can interact with the environment as you want. Note that your app’s file system is read-only, except for any [mounts you’ve defined]/create-apps/app-reference/single-runtime-image.md#mounts).
Connect to services
To connect to a service, you need the service credentials. Then you can connect either with a direct tunnel or a tunnel in your app.
Use a direct tunnel
To open SSH tunnels for all of your services, run the following command:
platform tunnel:open
You get output similar to the following:
SSH tunnel opened to database at: http://127.0.0.1:30000
Logs are written to: ~/.platform/tunnels.log
List tunnels with: platform tunnels
View tunnel details with: platform tunnel:info
Close tunnels with: platform tunnel:close
Save encoded tunnel details to the PLATFORM_RELATIONSHIPS variable using:
export PLATFORM_RELATIONSHIPS="$(platform tunnel:info --encode)"
Use the returned host (in this case http://127.0.0.1:30000
) for your connection
and fill in the details with the rest of your service credentials.
The tunnel:open
command connects all relationships defined in your app configuration.
To open only one connection when you have multiple relationships defined, run tunnel:single
.
By default, this opens a tunnel at http://127.0.0.1:30000
.
You can specify the port for the connection using the --port
flag.
Use an app tunnel
Many database applications (such as MySQL Workbench) support establishing their own SSH tunnel. You need to use SSH keys for authentication. Consult the documentation for your application for how to enter SSH credentials.
Get SSH connection details
To get the host and username for connections, follow these steps:
Run the following command:
platform ssh --pipe --project PROJECT_ID
You get output similar to the following:
jyu7waly36ncj-main-7rqtwti--app@ssh.us.platform.sh
- Navigate to the environment you want to connect to.
- Click SSH in the top right-hand corner.
- You get output similar to the following:
jyu7waly36ncj-main-7rqtwti--app@ssh.us.platform.sh
The host is everything after the @
and the username is what’s before it.
In this case, the host is ssh.us.platform.sh
and the username is jyu7waly36ncj-main-7rqtwti--app
.
The host is the same for the entire project, while the username varies by environment.
To connect to a service, fill in the details with the rest of your service credentials.
Alternative authentication methods
There are three basic ways to authenticate with Platform.sh:
- Through the CLI
- The fastest and easiest method.
- Supports multifactor authentication.
- Automatically generates new certificates to keep your connection safe.
- Necessary when using the CLI and when your organization has multifactor authentication set up.
- Using SSH keys
- Requires more setup on your part.
- Represents only a single authentication method.
- Requires you to regularly change the keys to maintain security.
- Useful for checking out code as part of an automated process.
- Using API tokens
- Good for letting automation tools use the CLI.
- Requires you to regularly change the tokens to maintain security.
SSH into an MFA-protected environment
For enhanced security, as an organization owner or admin user, you can enforce Multi-Factor Authentication (MFA) within your organization.
As a project contributor, if you haven’t enabled MFA on your user account and SSH into an environment that is protected by MFA, you get an error message. See how you can troubleshoot that error message.