Universal SSH Key Manager

As the inventors of the SSH protocol, SSH Communications Security is focused on helping organizations of all types and sizes secure the path to their information assets. Our Universal SSH Key Manager is designed to deliver a fully interoperable and easily scalable solution that allows both Tectia and OpenSSH customers to save time and money by eliminating the complex, manual work required to manage enterprise environments, reducing the risk of unauthorized access from both internal and external actors and improving visibility and compliance.

Universal SSH Key Manager offers:

 
Discover the trust relationships with no changes to your existing SSH environment
  • Automatically collect private and public user key information within the managed environment
  • Generate key data and visibility around trust relationships in the SSH environment
  • Organize the users and identities to collected accounts
  • Map the collected information to persons/identities via IMS (such as AD or LDAP) connection
  • Visualize existing trust relationships as to who has access to which servers and with what accounts
  • Organize users and hosts into groups (local and AD/LDAP based) and use these groups to create authorization rules as to who is able to access which SSH servers.
  • Manage and control your SSH User Key environmentEnforce the authorization rules and enable the management of the key environment
  • Automate public key management (distribution, replacement, removal)
  • Automate private key lifecycle management (creation, renewal, removal)
  • Enforce approval process management for requesting and authorizing key deployments
Organize the users and identities to collected accounts
  • Map the collected information to persons/identities via IMS (such as AD or LDAP) connection
  • Visualize existing trust relationships as to who has access to which servers and with what accounts
  • Organize users and hosts into groups (local and AD/LDAP based) and use these groups to create authorization rules as to who is able to access which SSH servers.
Manage and control your SSH User Key environment
  • Enforce the authorization rules and enable the management of the key environment
  • Automate public key management (distribution, replacement, removal)
  • Automate private key lifecycle management (creation, renewal, removal)
  • Enforce approval process management for requesting and authorizing key deployments