Use SSH Keys

SSH keys can be used for authentication rather than user names and passwords. At startup, BeyondInsight for Unix & Linux creates a new keypair if there isn’t one in the system.

BeyondInsight for Unix & Linux maintains one active key at a time.

Deploy an SSH Key

You can deploy a key to one server or select more than one server and use the Actions menu to deploy the key.

Credentials imported from Password Safe cannot use the BeyondInsight for Unix & Linux SSH key for authentication.

To deploy SSH keys:

  1. Go to the Hosts > Host Inventory page.
  2. Select one or more servers.
  3. From the menu, select Deploy SSH Key For Authentication.
  4. Select a credential from the list. The current active SSH key is added to the user's authorized keys (~/.ssh/authorized_keys file) on the selected hosts.

Download a Public Key

You can download the public key to use external to BeyondInsight for Unix & Linux, for instance, by adding the key to a virtual machine template.

  1. Go to the Hosts > SSH Key Management page.
  2. Select Manage SSH Keys.
  3. Select Download Public Key.

Rotate a Public Key

You can rotate the SSH key and push to known hosts already using a key.

  1. Go to the Hosts > SSH Key Management page.
  2. Select Manage SSH Keys.
  3. Select Rotate SSH Key.
  4. Select one of the following:
    • Deploy To Latest: Push the new key to hosts that are known by BeyondInsight for Unix & Linux to be using the most recent active key.
    • Deploy To All: Push this key to all hosts that BeyondInsight for Unix & Linux has pushed keys to before.
  1. Click Rotate SSH Key.

Disable a Key

You can disable the SSH key.

  1. Go to the Hosts > SSH Key Management page.
  2. Select one or more keys in the list.
  3. From the Actions menu, select Disable Keys.