{"version":1,"pages":[{"id":"kzTlst3tKo255yz4YpDi","title":"Key9 Documentation Portal.","pathname":"/key9-identity","siteSpaceId":"sitesp_3pFwr"},{"id":"P1nVhxmd6GZF2JtYZ7iL","title":"Installation & Setup","pathname":"/key9-identity/ssh/installation-and-setup","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"}]},{"id":"CyH2xJQs9yWJ1S8BYNav","title":"MacOS Yubikey Smartcard/PIV instructions.","pathname":"/key9-identity/ssh/installation-and-setup/quickstart","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"}]},{"id":"3pyEUDauVuL1ARaiOgQv","title":"1. Installation of MacOS software","pathname":"/key9-identity/ssh/installation-and-setup/quickstart/1.-installation-of-macos-software","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"MacOS Yubikey Smartcard/PIV instructions."}]},{"id":"QLg3aIsMoQjR5AkmqUnB","title":"2. Changing the Yubikey PIN.","pathname":"/key9-identity/ssh/installation-and-setup/quickstart/2.-changing-the-yubikey-pin.","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"MacOS Yubikey Smartcard/PIV instructions."}]},{"id":"87J2z8Zm2SqgUvn1CeIK","title":"3. Generating Keys and Certificates for the Yubikey","pathname":"/key9-identity/ssh/installation-and-setup/quickstart/3.-generating-keys-and-certificates-for-the-yubikey","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"MacOS Yubikey Smartcard/PIV instructions."}]},{"id":"8d7auwhldjEnjwrxfl1n","title":"4. Enrolling the public key to Key9","pathname":"/key9-identity/ssh/installation-and-setup/quickstart/4.-enrolling-the-public-key-to-key9","siteSpaceId":"sitesp_3pFwr","description":"** NOTE: If your Yubikey is already enrolled with Key9, you can skip these steps!","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"MacOS Yubikey Smartcard/PIV instructions."}]},{"id":"6rpAAMvfVc1c3JbdjA8q","title":"5. Testing and configuring SSH","pathname":"/key9-identity/ssh/installation-and-setup/quickstart/5.-testing-and-configuring-ssh","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"MacOS Yubikey Smartcard/PIV instructions."}]},{"id":"yWnfH9bnei42nICjYVOH","title":"Windows Yubikey Smartcard/PIV instructions","pathname":"/key9-identity/ssh/installation-and-setup/windows-yubikey-smartcard-piv-instructions","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"}]},{"id":"BkkOIY0di7rSENBApNa4","title":"1. Installation of Windows software.","pathname":"/key9-identity/ssh/installation-and-setup/windows-yubikey-smartcard-piv-instructions/1.-installation-of-windows-software.","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"Windows Yubikey Smartcard/PIV instructions"}]},{"id":"kGWLv71pH48cd0gNOnYv","title":"2. Getting the system ready for libykcs11.dll","pathname":"/key9-identity/ssh/installation-and-setup/windows-yubikey-smartcard-piv-instructions/2.-getting-the-system-ready-for-libykcs11.dll","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"Windows Yubikey Smartcard/PIV instructions"}]},{"id":"DcBUI5SrmnKey3Xk5oD9","title":"3. Adding libykcs11.dll to SSH configurations.","pathname":"/key9-identity/ssh/installation-and-setup/windows-yubikey-smartcard-piv-instructions/3.-adding-libykcs11.dll-to-ssh-configurations.","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"Windows Yubikey Smartcard/PIV instructions"}]},{"id":"iRJC2vUIlNwMJLaBG95Z","title":"4. Generating Keys and Certificates for the Yubikey","pathname":"/key9-identity/ssh/installation-and-setup/windows-yubikey-smartcard-piv-instructions/4.-generating-keys-and-certificates-for-the-yubikey","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"Windows Yubikey Smartcard/PIV instructions"}]},{"id":"JjOFbl2GbcNrC6Zegv2l","title":"5. Enrolling the public key to Key9","pathname":"/key9-identity/ssh/installation-and-setup/windows-yubikey-smartcard-piv-instructions/5.-enrolling-the-public-key-to-key9","siteSpaceId":"sitesp_3pFwr","description":"** NOTE:  If your Yubikey is already enrolled with Key9,  you can skip these steps!","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"Windows Yubikey Smartcard/PIV instructions"}]},{"id":"XLZEZSoTpUy5UH4wu9Tr","title":"6.  Testing your SSH key.","pathname":"/key9-identity/ssh/installation-and-setup/windows-yubikey-smartcard-piv-instructions/6.-testing-your-ssh-key.","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"Windows Yubikey Smartcard/PIV instructions"}]},{"id":"DqFj4bVUxPu14RcMtx71","title":"OpenSSH with Yubikey / FIDO2 protected keys","pathname":"/key9-identity/ssh/installation-and-setup/openssh-with-yubikey-fido2-protected-keys","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"}]},{"id":"0kM8XfwsUcSUIdvkVaLH","title":"1. Prerequisites","pathname":"/key9-identity/ssh/installation-and-setup/openssh-with-yubikey-fido2-protected-keys/1.-prerequisites","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"OpenSSH with Yubikey / FIDO2 protected keys"}]},{"id":"QUQNXtZHR34ljuzMcnAI","title":"2. OpenSSH command for Yubkey FIDO2","pathname":"/key9-identity/ssh/installation-and-setup/openssh-with-yubikey-fido2-protected-keys/2.-openssh-command-for-yubkey-fido2","siteSpaceId":"sitesp_3pFwr","description":"Unfortunately,  Windows 11 does not currently support FIDO2 enrollment.","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"OpenSSH with Yubikey / FIDO2 protected keys"}]},{"id":"rP55Gehu7mMVHUfNx8Iw","title":"3. Enrolling your public key to Key9","pathname":"/key9-identity/ssh/installation-and-setup/openssh-with-yubikey-fido2-protected-keys/3.-enrolling-your-public-key-to-key9","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"OpenSSH with Yubikey / FIDO2 protected keys"}]},{"id":"BBzpY0x3BdXHszSQsOOv","title":"4. Testing your SSH key","pathname":"/key9-identity/ssh/installation-and-setup/openssh-with-yubikey-fido2-protected-keys/4.-testing-your-ssh-key","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"OpenSSH with Yubikey / FIDO2 protected keys"}]},{"id":"Oo7G5LwGy5EK2sGBzl9W","title":"Setting a Yubikey PIN without Yubikey software.","pathname":"/key9-identity/ssh/installation-and-setup/setting-a-yubikey-pin-without-yubikey-software.","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"}]},{"id":"L1zhoRCZsOEBw6aai7qh","title":"1.  Using Key9 \"registration\" to register a new Yubikey PIN.","pathname":"/key9-identity/ssh/installation-and-setup/setting-a-yubikey-pin-without-yubikey-software./1.-using-key9-registration-to-register-a-new-yubikey-pin.","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"Setting a Yubikey PIN without Yubikey software."}]},{"id":"ibidnpR9EK5WCiL1ANLA","title":"2. Using \"webauthn.io\" to register a new Yubikey PIN.","pathname":"/key9-identity/ssh/installation-and-setup/setting-a-yubikey-pin-without-yubikey-software./2.-using-webauthn.io-to-register-a-new-yubikey-pin.","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"Setting a Yubikey PIN without Yubikey software."}]},{"id":"4FlBciP0zUXmFX7NYnn0","title":"RSA Password Protected SSH Key","pathname":"/key9-identity/ssh/installation-and-setup/rsa-password-protected-ssh-key","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"}]},{"id":"Lqdmx1qJp724CU1saHVE","title":"1. Key9 Settings to allow RSA","pathname":"/key9-identity/ssh/installation-and-setup/rsa-password-protected-ssh-key/1.-key9-settings-to-allow-rsa","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"RSA Password Protected SSH Key"}]},{"id":"PeWLk5EH3xS2NC50AWKv","title":"2. Generating RSA SSH Key","pathname":"/key9-identity/ssh/installation-and-setup/rsa-password-protected-ssh-key/2.-generating-rsa-ssh-key","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"RSA Password Protected SSH Key"}]},{"id":"J6WgPSVAUVRG61rt4Mt7","title":"3. Enrolling your public key to Key9","pathname":"/key9-identity/ssh/installation-and-setup/rsa-password-protected-ssh-key/3.-enrolling-your-public-key-to-key9","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"RSA Password Protected SSH Key"}]},{"id":"tftc903IvSpjwIGmg9l3","title":"4. Testing your SSH key","pathname":"/key9-identity/ssh/installation-and-setup/rsa-password-protected-ssh-key/4.-testing-your-ssh-key","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"RSA Password Protected SSH Key"}]},{"id":"9MdKTfCnfjqu5SDdcjmf","title":"Determine your Yubikey Type","pathname":"/key9-identity/ssh/installation-and-setup/determine-your-yubikey-type","siteSpaceId":"sitesp_3pFwr","description":"Without loading the Yubikey Manager.","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"}]},{"id":"U5VKxo4H1OI1Qv9o7f5L","title":"1. Linux \"lsusb\" command","pathname":"/key9-identity/ssh/installation-and-setup/determine-your-yubikey-type/1.-linux-lsusb-command","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"Determine your Yubikey Type"}]},{"id":"igMVoCLVKqy9Fitp6TX0","title":"2. MacOS \"ioreg\" command","pathname":"/key9-identity/ssh/installation-and-setup/determine-your-yubikey-type/2.-macos-ioreg-command","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"Determine your Yubikey Type"}]},{"id":"QGLGFAu5j3zr11z6DWU0","title":"3.  Windows 11","pathname":"/key9-identity/ssh/installation-and-setup/determine-your-yubikey-type/3.-windows-11","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"Determine your Yubikey Type"}]},{"id":"06kXMXqKq6S8FQPXqfTj","title":"Useful External Links","pathname":"/key9-identity/ssh/installation-and-setup/useful-external-links","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"}]},{"id":"BWeflRK9NxBLhFzSyqkf","title":"Windows Powershell with Yubikey/FIDO2-protected SSH keys","pathname":"/key9-identity/ssh/installation-and-setup/windows-powershell-with-yubikey-fido2-protected-ssh-keys","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"}]},{"id":"N9INWpB9UvwrhfZ9hBfM","title":"1. Download OpenSSH for Windows.","pathname":"/key9-identity/ssh/installation-and-setup/windows-powershell-with-yubikey-fido2-protected-ssh-keys/1.-download-openssh-for-windows.","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"Windows Powershell with Yubikey/FIDO2-protected SSH keys"}]},{"id":"AtL0ScRkvZaRwsSW4eXI","title":"2. Setting up your SSH keys","pathname":"/key9-identity/ssh/installation-and-setup/windows-powershell-with-yubikey-fido2-protected-ssh-keys/2.-setting-up-your-ssh-keys","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"Windows Powershell with Yubikey/FIDO2-protected SSH keys"}]},{"id":"FdOVYjUfxtl9dbjFjQBo","title":"3. Enrolling your public key to Key9","pathname":"/key9-identity/ssh/installation-and-setup/windows-powershell-with-yubikey-fido2-protected-ssh-keys/3.-enrolling-your-public-key-to-key9","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"Windows Powershell with Yubikey/FIDO2-protected SSH keys"}]},{"id":"Kcb8S03KmqjR7LeRY3zU","title":"Technical Notes","pathname":"/key9-identity/ssh/installation-and-setup/technical-notes","siteSpaceId":"sitesp_3pFwr","description":"\"Here are the notes detailing issues and their respective fixes for Passkeys and SSH Keys.\"","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"}]},{"id":"ngpj0vdgazo1AT4GMuOF","title":"Pop!_OS - \"agent refused operation\"","pathname":"/key9-identity/ssh/installation-and-setup/technical-notes/pop-_os-agent-refused-operation","siteSpaceId":"sitesp_3pFwr","description":"This fix may apply to other Linux distributions.","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"Technical Notes"}]},{"id":"1wu2IS3Cqu48UhnXNb7t","title":"Key9 SSH for Debian 12 [Bookworm] Howto","pathname":"/key9-identity/ssh/installation-and-setup/key9-ssh-for-debian-12-bookworm-howto","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"}]},{"id":"HFLNbFhgyfQ6MlkoXHSO","title":"1. Installing GPG","pathname":"/key9-identity/ssh/installation-and-setup/key9-ssh-for-debian-12-bookworm-howto/1.-installing-gpg","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"Key9 SSH for Debian 12 [Bookworm] Howto"}]},{"id":"vQvS47Bno4Y3ysBfja1V","title":"2. Configuring the Key9 Debian 12 Repo.","pathname":"/key9-identity/ssh/installation-and-setup/key9-ssh-for-debian-12-bookworm-howto/2.-configuring-the-key9-debian-12-repo.","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"Key9 SSH for Debian 12 [Bookworm] Howto"}]},{"id":"sDGZ4SiC6AbAzvkMaVo1","title":"3.  Configuring the Key9 SSH client","pathname":"/key9-identity/ssh/installation-and-setup/key9-ssh-for-debian-12-bookworm-howto/3.-configuring-the-key9-ssh-client","siteSpaceId":"sitesp_3pFwr","description":"This page describes editing the /opt/k9/etc/k9.yaml","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"Key9 SSH for Debian 12 [Bookworm] Howto"}]},{"id":"hfGaEKYpGWE5khCNONlK","title":"4.  Configuring Name Service Switch [/etc/nsswitch.conf]","pathname":"/key9-identity/ssh/installation-and-setup/key9-ssh-for-debian-12-bookworm-howto/4.-configuring-name-service-switch-etc-nsswitch.conf","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"Key9 SSH for Debian 12 [Bookworm] Howto"}]},{"id":"vCd0OXAtnt5Yy2RILbma","title":"5. Configuring the OpenSSH server","pathname":"/key9-identity/ssh/installation-and-setup/key9-ssh-for-debian-12-bookworm-howto/5.-configuring-the-openssh-server","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"Key9 SSH for Debian 12 [Bookworm] Howto"}]},{"id":"MNtV4EYt3TOn2fO6Sbl3","title":"6. Modifying \"sudoers\" [optional]","pathname":"/key9-identity/ssh/installation-and-setup/key9-ssh-for-debian-12-bookworm-howto/6.-modifying-sudoers-optional","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"Key9 SSH for Debian 12 [Bookworm] Howto"}]},{"id":"pSLYa09TyX4Chl6fG77a","title":"7. Configuring \"k9-tail\" for logs [optional]","pathname":"/key9-identity/ssh/installation-and-setup/key9-ssh-for-debian-12-bookworm-howto/7.-configuring-k9-tail-for-logs-optional","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"Key9 SSH for Debian 12 [Bookworm] Howto"}]},{"id":"TfMtxK6fXZGfmUNNe1w0","title":"8. Automatic home directory creation [optional]","pathname":"/key9-identity/ssh/installation-and-setup/key9-ssh-for-debian-12-bookworm-howto/8.-automatic-home-directory-creation-optional","siteSpaceId":"sitesp_3pFwr","breadcrumbs":[{"label":"SSH","icon":"rectangle-terminal"},{"label":"Installation & Setup"},{"label":"Key9 SSH for Debian 12 [Bookworm] Howto"}]},{"id":"cEHgDv7NGBquDGHeLyQ4","title":"Marketplace Applications","pathname":"/key9-identity/web/marketplace","siteSpaceId":"sitesp_3pFwr","description":"Easy Application creation.","breadcrumbs":[{"label":"Web","icon":"globe"}]},{"id":"p0fPBprFjL0qy7LgrIt8","title":"Amazon Web Services","pathname":"/key9-identity/web/marketplace/amazon-web-services","siteSpaceId":"sitesp_3pFwr","description":"Configuring Key9 Identity SAML SSO with AWS","breadcrumbs":[{"label":"Web","icon":"globe"},{"label":"Marketplace Applications"}]},{"id":"GlWkYDwaRpU3nYp1qkXu","title":"Atlassian Jira","pathname":"/key9-identity/web/marketplace/atlassian-jira","siteSpaceId":"sitesp_3pFwr","description":"Configuring Key9 Identity SAML SSO with Atlassian Jira","breadcrumbs":[{"label":"Web","icon":"globe"},{"label":"Marketplace Applications"}]},{"id":"AuKUnTYbf7YxqUUbbHE2","title":"Cyera","pathname":"/key9-identity/web/marketplace/cyera","siteSpaceId":"sitesp_3pFwr","description":"Configuring Key9 Identity SAML SSO with Cyera","breadcrumbs":[{"label":"Web","icon":"globe"},{"label":"Marketplace Applications"}]},{"id":"fI1zNtGzc2DJauwOdHqu","title":"DigitalOcean","pathname":"/key9-identity/web/marketplace/digitalocean","siteSpaceId":"sitesp_3pFwr","description":"Configuring Key9 Identity OpenID with GitBook","breadcrumbs":[{"label":"Web","icon":"globe"},{"label":"Marketplace Applications"}]},{"id":"N2HcGZVWT1wANHai9zKu","title":"GitBook","pathname":"/key9-identity/web/marketplace/gitbook","siteSpaceId":"sitesp_3pFwr","description":"Configuring Key9 Identity SAML SSO with GitBook","breadcrumbs":[{"label":"Web","icon":"globe"},{"label":"Marketplace Applications"}]},{"id":"aMxWQRWmJSduNbeZubeK","title":"Google Workspace","pathname":"/key9-identity/web/marketplace/google-workspace","siteSpaceId":"sitesp_3pFwr","description":"Configuring Key9 Identity SAML SSO with Google Workspace","breadcrumbs":[{"label":"Web","icon":"globe"},{"label":"Marketplace Applications"}]},{"id":"hrQc9FGvTZRyHaqaBdW4","title":"KnowBe4","pathname":"/key9-identity/web/marketplace/knowbe4","siteSpaceId":"sitesp_3pFwr","description":"Configuring Key9 Identity SAML SSO with KnowBe4","breadcrumbs":[{"label":"Web","icon":"globe"},{"label":"Marketplace Applications"}]},{"id":"SyAOYEF3pBIZiVxICzyD","title":"LibreNMS","pathname":"/key9-identity/web/marketplace/librenms","siteSpaceId":"sitesp_3pFwr","description":"Configuring Key9 Identity SAML SSO with LiberNMS","breadcrumbs":[{"label":"Web","icon":"globe"},{"label":"Marketplace Applications"}]},{"id":"Zmx65QDF5ZXjDkit7OSt","title":"NetBox","pathname":"/key9-identity/web/marketplace/netbox","siteSpaceId":"sitesp_3pFwr","description":"Configuring Key9 Identity SAML SSO with Netbox","breadcrumbs":[{"label":"Web","icon":"globe"},{"label":"Marketplace Applications"}]},{"id":"wlue2OvDifZj5UZGDOg0","title":"SentinalOne","pathname":"/key9-identity/web/marketplace/sentinalone","siteSpaceId":"sitesp_3pFwr","description":"Configuring Key9 Identity SAML SSO with SentinalOne","breadcrumbs":[{"label":"Web","icon":"globe"},{"label":"Marketplace Applications"}]},{"id":"RjBCHw3SQtzdCuNWtep6","title":"Wiz","pathname":"/key9-identity/web/marketplace/wiz","siteSpaceId":"sitesp_3pFwr","description":"Configuring Key9 Identity SAML SSO with Wiz","breadcrumbs":[{"label":"Web","icon":"globe"},{"label":"Marketplace Applications"}]},{"id":"nQUu1sgEwEGEUeueMfSZ","title":"1. What is JSONAir","pathname":"/key9-identity/jsonair","siteSpaceId":"sitesp_enPy8","description":"A cloud based, simple to use,  centralized configurations storage system."},{"id":"b3HU2quD6ZybXO92EbFS","title":"1.1 Licensing","pathname":"/key9-identity/jsonair/1-what-is-jsonair/1.1-licensing","siteSpaceId":"sitesp_enPy8","description":"MIT License.","breadcrumbs":[{"label":"1. What is JSONAir"}]},{"id":"SeYmjqgzMR9eAQYNFCrW","title":"2. Installation","pathname":"/key9-identity/jsonair/2-install","siteSpaceId":"sitesp_enPy8","description":""},{"id":"hh158MpirlILaO3Axhva","title":"2.2 Dependancies","pathname":"/key9-identity/jsonair/2-install/2.2-dependancies","siteSpaceId":"sitesp_enPy8","description":"What you need to run JSONAir.","breadcrumbs":[{"label":"2. Installation"}]},{"id":"FUuuR9I5VotQRyoYaC4r","title":"2.3 Compiling JSONAir","pathname":"/key9-identity/jsonair/2-install/2.3-compiling-jsonair","siteSpaceId":"sitesp_enPy8","description":"How to build JSONAir from source.","breadcrumbs":[{"label":"2. Installation"}]},{"id":"AfxvCEYuzx5vmc88uDbG","title":"2.4 Database Setup","pathname":"/key9-identity/jsonair/2-install/2.4-database-setup","siteSpaceId":"sitesp_enPy8","description":"How to create and configure the JSONAir database.","breadcrumbs":[{"label":"2. Installation"}]},{"id":"W7WDVOYsZi89PNEQ6vm3","title":"2.5 Configuring and Running JSONAir","pathname":"/key9-identity/jsonair/2-install/2.5-configuration","siteSpaceId":"sitesp_enPy8","description":"How to configure and start the JSONAir server.","breadcrumbs":[{"label":"2. Installation"}]},{"id":"058eSVEsECCc7PEMOG8D","title":"2.6 Configuring and Running the JSONAir Agent","pathname":"/key9-identity/jsonair/2-install/2.6-agent-configuration","siteSpaceId":"sitesp_enPy8","description":"How to configure and run the JSONAir agent.","breadcrumbs":[{"label":"2. Installation"}]},{"id":"J4wQzqyIwDo0CTEXJftA","title":"2.7 Encrypting Configuration Data","pathname":"/key9-identity/jsonair/2-install/2.7-encrypting-config-data","siteSpaceId":"sitesp_enPy8","description":"How to encrypt and decrypt configuration data for storage in JSONAir.","breadcrumbs":[{"label":"2. Installation"}]},{"id":"j7LlwyldwhQlFuNvheWB","title":"3. Using the API","pathname":"/key9-identity/jsonair/3-using-the-api","siteSpaceId":"sitesp_enPy8","description":"Overview of the JSONAir API."},{"id":"4wEJxfi3V6x8K0lg06cp","title":"3.1 Authentication","pathname":"/key9-identity/jsonair/3-using-the-api/3.1-authentication","siteSpaceId":"sitesp_enPy8","description":"How to authenticate with the JSONAir API.","breadcrumbs":[{"label":"3. Using the API"}]},{"id":"dG0DAPAHl92hxxeMwVqr","title":"3.2 Making API Requests","pathname":"/key9-identity/jsonair/3-using-the-api/3.2-make-api-requests","siteSpaceId":"sitesp_enPy8","description":"How to call the JSONAir API endpoints.","breadcrumbs":[{"label":"3. Using the API"}]},{"id":"bL55Ji2W4LDR05Vvfh5h","title":"3.3 Golang Examples","pathname":"/key9-identity/jsonair/3-using-the-api/3.3-golang-examples","siteSpaceId":"sitesp_enPy8","description":"Go code examples for interacting with the JSONAir API.","breadcrumbs":[{"label":"3. Using the API"}]},{"id":"BjEkZtnvUdM9isw5U1xG","title":"3.4 Curl Examples","pathname":"/key9-identity/jsonair/3-using-the-api/3.4-curl-examples","siteSpaceId":"sitesp_enPy8","description":"curl examples for interacting with the JSONAir API.","breadcrumbs":[{"label":"3. Using the API"}]},{"id":"wCmhhC8DASHWdgCqxk6r","title":"3.5 Python Examples","pathname":"/key9-identity/jsonair/3-using-the-api/3.5-python-examples","siteSpaceId":"sitesp_enPy8","description":"Python code examples for interacting with the JSONAir API.","breadcrumbs":[{"label":"3. Using the API"}]}]}