Create Users' Credentials
Credential Manager: Overview
Credential Manager (CM) is the "digital locker" where ARM stores log-in credentials like usernames and passwords. It securely stores your credentials, so you only need to enter them once for each remote repository you access. Storing login information in the ARM CM saves you time when you frequently access a file shared on another machine.
Create a New Credential
Log into ARM with username [email protected], for example, then do the following:
Hover your mouse over the
Admintile and select the option forCredentials.

Click
Create Credential.

On the next pop-up screen, enter a
Credential name.Choose a
Credential Typefrom the drop-down field.Username with Password
SSH
HashiCorp Vault
SSH Certificate
Username with Password
Password-based authentication requires the user to enter their username and password to create a credential.

Credential Scope lets you specify exactly what type of access you need.
Global:Credential to be accessed by the teamPrivate:Credential for private usage
SSH
SSH is an encrypted protocol used to administer and communicate with servers. SSH is a secure way to access a site’s server remotely. The user must generate a public/private key pair on the client machine to identify them on the servers. You can choose to protect it with a password. Entering it with no password means anyone with access to the key files has the same level of access as the user, and no password is required when the client connects to the servers. Protecting the keys with a password means that whenever the user connects to a server using those keys, the password for decrypting it is required.

HashiCorp Vault
You can now choose the AWS Authentication method while adding HashiCorp credentials to ARM to generate the Vault Token automatically whenever the existing token expires. Now the user does not have to update the token manually from the application when it expires. Click here for a more detailed article on this topic.

Authentication using SSH Certificates
About SSH Certificates
SSH certificates allow one SSH key to sign another SSH key, resulting in an SSH certificate. A server that trusts the Certificate Authority (CA) can verify the certificate’s signature and trust the certificate and its associated metadata.
Learn more information about SSH certificate authorities at https://docs.github.com/en/enterprise-cloud@latest/organizations/managing-git-access-to-your-organizations-repositories/about-ssh-certificate-authorities
How is an SSH certificate different than an SSH key?
SSH uses key-based authentication with public key cryptography, while an SSH certificate-based authentication and attaches a signed certificate to each key to verify their identities. By using a certificate signed by a trusted CA, users can do away with passwords, which are not secure, given that passwords can either be stolen or cracked via brute force, and leverage a partially automated, trust-based certificate authentication process to gain access to systems.
How to add SSH certificates?
To give organizations more control over how their members access their repositories in GitHub, ARM now supports credentials of the SSH Certificate type. The user must upload the key for the SSH certificate while creating a credential. Then the user can later authenticate the repositories and add them inside ARM using the credential.
SSH certificates only allow access to repositories that belong to their organization.

Limitation: Adding SSH certificates is currently limited to organizations using GitHub Enterprise Cloud.
How do I set up an SSH key?
Generate SSH Keys
Open Command Prompt.
Provide a file name (for identification) and press Enter.
Confirm the default directory by pressing Enter again.
Keys will be generated in a path such as
C:/Users/<username>/.
Generated files:
Example→ Private keyExample.pub→ Public key
Add SSH Key to GitHub
Open the public key file (
Example.pub) in Notepad and copy the contents.Go to GitHub → Profile (top-right) → Settings → SSH and GPG Keys.
Click New SSH key.
Provide a title, keep the Key type default, and paste the key.
Click Configure SSO and then Authorize.
Configure SSH in ARM
Navigate to ARM → Admin → Credentials.
Create new credentials:
Credential Name: user-defined
Credential Type: SSH
Credential Scope: Private
Username: Git username
Password: Not required
Browse and upload the private key file (
Example).Click Upload and Save.
Verify Integration
Go to My Version Control Mappings in the profile.
Validate the connection to confirm successful integration.
Summary / Conclusion / Next Steps:
ARM and GIT can be integrated via SSH authentication using generated key pairs.
Keys must be registered in GitHub and mapped in ARM Credentials.
Next Steps:
Ensure rotation and secure storage of private keys.
Test commits and merges post-integration to validate setup.
Document SSH credential mapping steps in onboarding guides.
Last updated
Was this helpful?

