-
Notifications
You must be signed in to change notification settings - Fork 759
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for multiple ssh agents #1987
Comments
This issue is a bit older, but since I've just ran into the same thing I will give my feedback. My understanding is that windows does not have "socket"-files as UNIX/Linux does. Instead it uses named pipes. My issue however was, that I had git for windows installed with its own openSSH installation, which caused 1Password to not work (since the openSSH installation was not using the named pipe but mingw64's UNIX-sockets). |
This used to be the case many, many moons ago. Windows 10 has supported Berkeley Domain Sockets for a good time now, but they haven't changed their fork of SSH to take advantage of it. Not having three different SSH-Agent protocols (BDS, Pageant, and weird named-pipe) would be a big step forward. Here's the "Issue". |
1Password recently added support for storing SSH keys in the password manager, using an included ssh agent that allows users to securely approve each request for the keys.
From what I understand from their docs though, it seems like Win32-OpenSSH is currently hardcoded to always use the default
\\.\pipe\openssh-ssh-agent
pipe and not respecting IdentityAgent values in .ssh/config which would allow users to use 1Password ssh-agent (and vault) for keys used in specific connections only.Any plans to support this in the future?
Please correct me if I've misunderstood this. 😄
The text was updated successfully, but these errors were encountered: