Provide SSH server access without sharing SSH keys with team

These days the SSH protocol is widely used by all kind of organizations to provide SSH server access to their servers running on-premises or on the cloud. Top class open source automation tools such as Chef, Ansible, etc., heavily rely on SSH server access to trigger deployments on servers. Even some organizations provide direct SSH server access to Docker containers running on their production servers. Cloud services like AWS, Azure, Google Cloud, Digitial Ocean, OpenShift, etc., enable SSH server access to their cloud servers by default.

SSH server access is inevitable on any kind of production infrastructure.

Traditional SSH key based authentication for SSH server access

The SSH protocol is designed to work as the client-server model, which requires SSH client program to be installed on the local machine and SSH server program on the remote server machine. To implement SSH key based authentication you need to first generate an RSA or DSA key pair, which contains a private and public key file. The SSH public key has to be deployed within user workspace on the server, whereas the SSH private key must be available on the local machine. Most of the organizations implement SSH server access with SSH key based authentication, the reason is SSH key based authentication is more secure than SSH password based authentication.

The private SSH key sits on the local machine which is a security risk.

Security risks associated with SSH key based authentication

By nature, you need to share private SSH key to all team members who need SSH server access to production servers. Even the use of SSH bastion hosts will only help you to provide centralized SSH server access to production servers, but cannot protect your private SSH key. In fact, your organization/business can be crashed in a second, if someone deliberately misuses the private SSH key. What will you do if,

  1. the private SSH key used to access production servers are copied?

  2. the laptop machine containing private SSH key is lost or stolen?

  3. you forget to rotate SSH keys on your production servers?

A compromised private SSH key can put an end to your business in seconds.

Understanding the need for centralized SSH key management

It is very difficult for any growing organization to securely store, manage and rotate SSH keys which are used to provide SSH server access for the team. With SloopEngine's centralized SSH key management you can securely store, manage and rotate SSH keys for each and every environment such as production, staging, development and more. All the SSH keys that are managed using SloopEngine's centralized SSH key management is encrypted and stored. Due to the adoption of cloud servers, it's a must for any organization or team to centrally manage SSH keys because of the security risks associated with it.

Provide controlled SSH server access without sharing SSH key

Suppose you may have tens, hundreds or thousands of servers running on the production environment. Controlling SSH server access for each and every team member becomes a complicated thing to manage as your team size grows. With SloopEngine's server access control feature you can manage SSH server access for each and every environment such as production, staging, development and more. Here you don't have to share the private SSH key with a team member in order to provide SSH server access. SloopEngine uses its built-in secure web SSH terminal to establish SSH connection using SSH key based authentication.

Interested? Signup today for free! Thank you.

Recent videos about SloopEngine

Subscribe for updates

Please check your mailbox after submitting this form. If you haven't received any email from SloopEngine, check your spam folder. If you find SloopEngine emails in spam folder immediately move it to inbox.