User key management for the Secure Shell (SSH)
First Claim
Patent Images
1. An apparatus, comprising:
- at least one processor; and
at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to manage secure shell (SSH) related keys, said keys utilized between a first managed host having an SSH client and a second managed host having an SSH server, wherein the managing comprises causing the second managed host to install a public key as an authorized key.
1 Assignment
0 Petitions
Accused Products
Abstract
Management of user keys for public key authentication using the SSH in large SSH deployments is automated by deploying a management system in the environment, discovering SSH identity keys and authorized keys, analyzing authorized connections between user accounts, and automatically managing the authorized connections and the key pairs used for authentication.
-
Citations
30 Claims
-
1. An apparatus, comprising:
-
at least one processor; and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to manage secure shell (SSH) related keys, said keys utilized between a first managed host having an SSH client and a second managed host having an SSH server, wherein the managing comprises causing the second managed host to install a public key as an authorized key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method comprising:
-
managing secure shell (SSH) related keys, said keys utilized between a first managed host having an SSH client and a second managed host having an SSH server; wherein the managing comprises causing the second managed host to install a public key as an authorized key. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
20. A computer program product stored on a computer readable medium comprising computer readable program code operable to cause a computer to:
-
manage secure shell (SSH) related keys, said keys utilized between a first managed host having an SSH client and a second managed host having an SSH server; wherein the managing comprises causing the second managed host to install a public key as an authorized key.
-
Specification