Hosting Offer Sale: Starting at ₹3999/Life-time





SSH Key Management

HostGanga Secure SSH Key Management — Centralize, Automate & Audit

Manage SSH access at scale: key lifecycle, rotation, certificate-based auth (OpenSSH CA), hardware keys, RBAC, audit trails and seamless deployment to servers & instances.

Live Preview — Keys & Access
Users: 342
Keys: 1,492
Recent Activity: user@dev pushed key → web-01

Core Capabilities

Everything you need to secure SSH access across servers, containers and cloud instances.

🔐

Central Key Store

Encrypted key vault, per-user keys, group keys, and per-project access lists. HSM-backed options available.

♻️

Automated Rotation

Automatic key rotation policies with zero-downtime re-deploy, scheduled or event-driven rotation support.

🧾

Audit & Compliance

Detailed logs, session recording (optional), exportable audit trails for compliance (ISO/HIPAA-ready).

🪪

SSH Certificates (OpenSSH CA)

Short-lived certificates issued by a central CA — revoke instantly and avoid per-server key updates.

🔁

Hardware Key Support

YubiKey / FIDO2 integration, PKCS#11 HSM, and physical token binding for high-security roles.

⚙️

API / Automation

Full REST API, Terraform provider, Ansible modules and CI/CD hooks for onboarding and provisioning keys.

How it Works — Simple & Secure

Centralize keys, issue certificates, automate deployment and track every SSH login. Typical flow:

  • 1. Developer creates key or registers hardware token.
  • 2. Admin approves via RBAC and assigns projects/hosts.
  • 3. System issues short-lived SSH certificate or deploys public key to authorized_hosts.
  • 4. Audit logs capture issuance and usage; rotation enforced automatically.

Security Features

  • Encrypted at-rest keys, AES-256; TLS 1.3 for transport
  • Role-Based Access Control (RBAC) & SSO (SAML / OIDC)
  • Per-host allowlists, forced commands & port restrictions
  • Revoke keys or certificates instantly across fleet
  • HSM-backed private key storage (optional)

Integrations

GitHub
GitLab
Ansible
Terraform
Vault

Quick Commands & Examples

Generate RSA key (developer):

ssh-keygen -t rsa -b 4096 -C "dev@company" -f ~/.ssh/id_rsa

Generate Ed25519 key:

ssh-keygen -t ed25519 -C "alice@company" -f ~/.ssh/id_ed25519

Issue OpenSSH certificate (CA signed):

# On CA: ssh-keygen -s ca_key -I user_alice -n alice -V +52w user_key.pub
# Then user connects: ssh -i user_key user@host

Provision via API (example):

curl -X POST https://api.hostganga.com/v1/ssh-keys \
 -H "Authorization: Bearer $TOKEN" \
 -d '{"username":"alice","public_key":"ssh-ed25519 AAAA..."}'

FAQ

Quick answers to common questions about SSH key security.

Can you rotate keys without downtime?

Yes — we deploy new keys/certificates in parallel and switch traffic once validation completes, enabling zero-downtime rotation.

Do you support hardware tokens?

Yes — YubiKey / FIDO2 and PKCS#11 HSMs are supported for key storage and signing operations.

How are private keys stored?

Private keys in our managed service are HSM-backed (optional) or encrypted with AES-256 at rest. Access to private material is limited and fully audited.

Is certificate-based auth better than keys?

Yes — OpenSSH certificates allow short-lived credentials, easy revocation, and avoid managing per-host authorized_keys files at scale.