SSH provides highly privileged access to IT resources across the enterprise. With BeyondTrust Privileged Identity, you have the visibility to know which systems and applications are accessed with SSH.
Privileged Identity enables you to use SSH keys to connect to and manage credentials on target systems. And you can automatically connect a user to a target system with a specific application, limiting their access to the system to specific commands and accesses available to the program.
SSH key management also lets you manage the life cycles of critical SSH key pairs, helping you ensure that keys provide your users with the correct access to the right applications and systems.
BeyondTrust Privileged Identity’s SSH key management features include: