Use SSH Keys

This topic describes the various ways of using SSH Keys.

Access remote machines

You can use SSH Keys that are stored in the Vault to access remote machines in the following ways:




For details, see Connect through PSM for SSH.


For details, see Connect through Privileged Session Manager for Windows.

Application or scripts

For details, see Mitigate risks for SSH Keys used by applications and scripts


For details, see Retrieve a private SSH Key.

The SSH Keys Platform

The PAM - Self-Hosted solution provides an out-of-the-box target platform to manage SSH keys, called Unix Via SSH Keys. In order to control the key size, the key format, the key encryption and so on, you can either modify this platform or copy it and customize it to create your own tailored platform while leaving the original platform untouched.

The following procedure describes how to modify the default platform.