Use SSH Keys

This topic describes the various ways of using SSH Keys.

Access remote machines

You can use SSH Keys that are stored in the Vault to access remote machines in the following ways:

Through

Description

PSM for SSH

For details, see Connect through PSM for SSH.

PSM

For details, see Connect through Privileged Session Manager for Windows.

Application or scripts

For details, see Mitigate risks for SSH Keys used by applications and scripts

PVWA

For details, see Retrieve a private SSH Key.

The SSH Keys Platform

The PAM - Self-Hosted solution provides an out-of-the-box target platform to manage SSH keys, called Unix Via SSH Keys. In order to control the key size, the key format, the key encryption and so on, you can either modify this platform or copy it and customize it to create your own tailored platform while leaving the original platform untouched.

The following procedure describes how to modify the default platform.