The system uses HTTPS by default for accessing the UI management interface, providing enhanced security.
HTTPS Protocol: ZStack ZSphere automatically redirects to the HTTPS address on port 443 by default. You can access the UI management interface by entering the management node IP address in your browser, for example, https://management_node_ip.
HTTP Protocol: HTTP protocol is disabled by default, but you can configure it manually if needed.
The system supports PKCS12 format certificates by default. Currently, only PKCS12 and JKS format certificates are supported. If you are using certificates in other formats, convert them to a supported format.
VM Console
The VM console provides users with a streamlined entry point for monitoring and managing virtual machines. You must have appropriate permissions to access the VM console. Two authentication methods are supported for console login: SSH key authentication and username/password.
SSH Key Authentication
You can use SSH key authentication to log in to Linux virtual machines.
An SSH key is a pair of cryptographic keys generated by an algorithm: a public key, which is shared openly, and a private key, which is kept secure by the user.
After a public key is attached to a virtual machine, you can use the corresponding private key to SSH into the virtual machine from another virtual machine without requiring a password.
To attach a public key during the virtual machine creation, ensure that the VM image has cloud-init pre-installed. The recommended cloud-init versions are 0.7.9, 17.1, 19.4, or later.
To attach a public key after the virtual machine creation, ensure that the virtual machine is running and has QEMU Guest Agent (QGA) installed and running. You can install QGA by installing the VMTools. If you install QGA by using other methods, install version 2.5 or later.
Username/Password
You can log into virtual machines using a username and password.
The fixed username for Linux virtual machines is root, and the fixed username for Windows virtual machines is administrator.
After a password is injected into a virtual machine, you can use the username or password to SSH into the virtual machine from another virtual machine.
Ensure that the VM image has cloud-init pre-installed. The recommended cloud-init versions are 0.7.9, 17.1, 19.4, or later.