mirror of
https://github.com/kevinveenbirkenbach/computer-playbook.git
synced 2025-03-29 04:23:34 +01:00
Root User
Description
This role manages the generation and handling of an SSH key for the root user on a target system. It ensures that an SSH key is generated if one does not already exist and outputs the public key, enabling secure SSH access for the root user in automated environments.
Overview
Optimized for secure system administration, this role performs the following tasks:
- Verifies the existence of a root SSH public key.
- Generates a new RSA 4096-bit SSH key pair for the root user if one is missing.
- Displays and outputs the generated public SSH key.
- Ensures that the key generation and display tasks run only once to maintain idempotency.
- Facilitates secure remote access using best practices for SSH.
Purpose
The primary purpose of this role is to enhance the security of the system by ensuring that a valid SSH key is available for the root user. By automating the generation and output of the public key, it reduces manual intervention and helps maintain a secure configuration for administrative access.
Features
- SSH Key Verification: Checks whether a root SSH public key exists.
- SSH Key Generation: Generates a new RSA 4096-bit SSH key pair for the root user if needed.
- Public Key Output: Displays and outputs the generated public SSH key.
- Idempotency: Ensures that key generation and output tasks execute only once.
- Secure Remote Access: Facilitates secure remote access by providing a verified public key for use with SSH.