Overview
This guide covers how to add SYNQ’s public SSH key to self-hosted and other SSH-based Git providers, including:- Self-hosted Git (Gitea, Gogs, GitBucket, etc.)
- Any other SSH-based Git provider
For GitHub, GitLab, Bitbucket, and Azure DevOps, see their dedicated setup guides:
Before you start: Create your Git integration in SYNQ first by following the integration form instructions. You’ll need the public SSH key from that integration.
Prerequisites
- Admin or appropriate access to configure SSH keys/deploy keys
- Public SSH key from your SYNQ Git integration
- Git provider accessible over the internet via SSH
⏱️ Estimated time: 10-15 minutes
Adding SSH Keys to Self-Hosted Git
The process for adding SSH keys to self-hosted Git instances varies by software, but generally follows this pattern:General Setup Steps
- Navigate to your repository settings in your Git interface
- Look for one of these sections:
- Deploy Keys (most common)
- Access Keys
- SSH Keys
- Click Add key or similar button
- Configure the key:
- Title/Name: Enter a descriptive name (e.g.,
SYNQ Integration) - Key: Paste the complete public SSH key from SYNQ
- Permissions: Select Read-only or equivalent
- Title/Name: Enter a descriptive name (e.g.,
- Save the key
Common Self-Hosted Git Platforms
Gitea
Gitea
- Go to your repository in Gitea
- Click Settings > Deploy Keys
- Add the title and paste the public key
- Do not check “Grant Write Access”
- Click Add Deploy Key
Gogs
Gogs
- Navigate to your repository
- Go to Settings > Deploy Keys
- Enter a key name and paste the public key
- Click Add Deploy Key
GitBucket
GitBucket
- Open your repository settings
- Navigate to Deploy Keys
- Add the title and public key
- Set permission to Read Only
- Click Add
Other Git Software
Other Git Software
For other self-hosted Git software:
- Consult your Git software’s documentation for SSH key or deploy key configuration
- Look for repository-level SSH key settings (preferred over user-level keys)
- Ensure the key is configured with read-only access
- Test the connection from SYNQ after adding the key
Requirements for Self-Hosted Git
Ensure your self-hosted Git instance meets these requirements:- Internet accessible: Must be reachable from SYNQ’s IP addresses
- SSH enabled: SSH protocol must be enabled (typically port 22)
- Firewall configured: Allow connections from SYNQ’s egress IPs
- Valid SSL certificate: If using HTTPS for the web interface
IP Whitelisting (If Required)
If your Git provider uses IP whitelisting, add SYNQ’s egress IP addresses for your region. For self-hosted Git instances, configure your firewall to allow connections from these IP addresses. See SYNQ IP Whitelist for the complete list of IP addresses.Troubleshooting
Deploy key/SSH key not working
- Verify the complete public key was copied (including the
ssh-rsaorssh-ed25519prefix) - Ensure the key was added to the correct repository or account
- Confirm the key has read-only permissions
Connection refused
- Check that IP whitelisting (if configured) includes SYNQ’s egress IPs
- Verify the repository SSH URL is correct in SYNQ’s integration form
- For self-hosted Git, ensure the instance is accessible from SYNQ’s IP addresses
Self-hosted Git issues
- Confirm your Git instance is accessible over the internet
- Verify firewall rules allow connections from SYNQ’s IPs
- Check that SSH is enabled and listening on the expected port (usually 22)
- Test SSH connectivity:
ssh -T [email protected]
Additional Resources
Need Help?
If you’re having trouble connecting your Git provider, contact SYNQ support with:- Your Git provider type (Bitbucket, Azure DevOps, self-hosted, etc.)
- The SSH URL format you’re using
- Any error messages from the connection attempt