Deploy keys allow Ultra gateways to authenticate with Ultra Hub without requiring a user to log in through a browser. This enables headless deployment scenarios like MDM fleet deployment, CI/CD pipelines, and server environments.Documentation Index
Fetch the complete documentation index at: https://docs.ultra.security/llms.txt
Use this file to discover all available pages before exploring further.
How Deploy Keys Work
A deploy key is a long-lived API token (prefixed withdk_) scoped to a specific workspace. When a gateway uses a deploy key, it:
- Authenticates with Ultra Hub using the key instead of a browser login
- Automatically links to the workspace the key is scoped to — this happens during
ultra install --all(for MDM deployments) or atultra starttime - Begins syncing policies, reporting telemetry, and enforcing guardrails
Creating a Deploy Key
Navigate to Settings > Security in the Ultra Hub dashboard. In the Deploy Keys section:- Enter a key name (e.g., “CI/CD pipeline”, “Engineering fleet”)
- Select the workspace the key should be scoped to
- Choose an expiry option (or select “No expiry” for permanent keys)
- Click Create Key
dk_ and looks like:
Using a Deploy Key
Environment Variable
Set theULTRA_DEPLOY_KEY environment variable before starting Ultra:
Config File
Add the key to your Ultra config file (~/.config/ultra/config.yaml):
Managed Preferences (MDM)
For fleet deployments, set theDeployKey managed preference via your MDM solution:
| Key | Value | Domain |
|---|---|---|
DeployKey | dk_... | com.ultra-security.ultra |
Managing Deploy Keys
The deploy keys table in Settings > Security shows all keys with their name, workspace, creation date, last used date, and expiry. Click Revoke to immediately invalidate a key.Identity Resolution
Deploy keys authenticate the gateway itself, but they don’t identify the user behind the device. To attribute gateways to specific employees, combine deploy keys with SCIM directory sync:- Set
UserEmailin managed preferences (populated by your MDM with the device owner’s email) - Ultra sends this email to Hub during gateway link and on every heartbeat
- Hub matches the email against the SCIM-provisioned user directory
- The gateway is attributed to that user for audit, policy, and RBAC
Security Considerations
- Treat deploy keys like passwords — store them in secure configuration management, not in source code
- Scope keys narrowly — create separate keys per workspace or deployment group
- Set expiry dates — for time-limited deployments, use expiring keys to limit exposure
- Revoke unused keys — regularly audit and revoke keys that are no longer needed
- Rotate keys — periodically create new keys and phase out old ones
Permissions
Deploy key management requires theorg:update permission. Only Owners and Admins can create, view, or revoke deploy keys. See RBAC for the full permissions matrix.