×

User key management for the secure shell (SSH)

  • US 10,003,458 B2
  • Filed: 12/21/2012
  • Issued: 06/19/2018
  • Est. Priority Date: 12/21/2011
  • Status: Active Grant
First Claim
Patent Images

1. An apparatus, comprising:

  • at least one processor; and

    at least one memory including instructions which when executed by the at least one processor, cause the apparatus to manage security related keys, the security related keys being utilized between a first managed host having a client and a second managed host having a server,wherein, in order to manage the security related keys, the at least one memory includes further instructions which, when executed by the at least one processor, further cause the apparatus to;

    install a security related key as an authorized security related key for the second managed host for securing communications with the first managed host, andwherein, in order to cause a security related key to be installed, the at least one memory includes further instructions which, when executed by the at least one processor, further cause the apparatus to;

    insert a request to install the security related key as an authorized security related key in a pending request data set;

    determine if a window where the request is allowed to be processed is open; and

    after determining that the window where the request is allowed to be processed is open, process the request, the processing comprising sending a request to install the security related key for the second managed host,wherein the at least one memory includes further instructions which, when executed by the at least one processor, cause the apparatus to create a new passwordless login connection,wherein, in order to create the new passwordless login connection, the at least one memory includes further instructions which, when executed by the at least one processor, further cause the apparatus to;

    add an identification of a certificate authority that is accepted for authentication in a configuration file used by a secure shell (SSH) implementation; and

    add a principal name used in a certificate in the configuration file used by the SSH implementation to identify a user that is permitted to authenticate to an account using the certificate issued by the certificate authority.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×