You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
docs: clarify supported PEM key formats and add conversion commands
Add a supported key formats table (PKCS#1 RSA, SEC1 EC supported;
PKCS#8, OpenSSH not supported), explain the -traditional flag, provide
conversion commands for unsupported formats, and update the FAQ with
specific error messages and fixes for PKCS#8 and OpenSSH keys.
Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
The `-traditional` flag in the RSA generation command ensures OpenSSL outputs PKCS#1 format (`BEGIN RSA PRIVATE KEY`) rather than PKCS#8 (`BEGIN PRIVATE KEY`). PKCS#8 is the default in newer OpenSSL versions and is not currently supported.
169
+
170
+
If you already have a key in an unsupported format, convert it before use:
Copy file name to clipboardExpand all lines: docs/overview/faq.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1356,6 +1356,8 @@ Starting from version **2602**, Aidbox validates JWT signing keys at startup and
1356
1356
* **Base64 content must be valid.** Truncated or corrupted key content will cause a startup failure.
1357
1357
* **The keypair must match.** The public key must correspond to the private key. Regenerate both if unsure.
1358
1358
* **Watch out for quoting issues.** When passing keys via environment variables, ensure newlines are preserved (use `\n` in single-line values or YAML multi-line `|` syntax).
1359
+
* **Key format must be PKCS#1 (RSA) or SEC1 (EC).** If you generated your key with `ssh-keygen`, the default OpenSSH format (`BEGIN OPENSSH PRIVATE KEY`) is not supported. Convert it with `ssh-keygen -p -m PEM -f key.pem`.
1360
+
* **PKCS#8 format is not supported.** If you see `PrivateKeyInfo cannot be cast to PEMKeyPair`, your key has a `BEGIN PRIVATE KEY` header (PKCS#8). Convert it with `openssl rsa -in key.pem -traditional -out key-pkcs1.pem`.
0 commit comments