Best Practice for SSH Keys?

rellek
rellek
Community Member
edited July 27 in SSH

Hello,

I have a question and I thought this could be one of the best places to ask it, being full of knowledgeable people about security.

Shame on me, I only started using SSH keys fairly recently. Because I would not want to believe that it is easier to handle AND more secure at the same time.

So I have some servers, some from the company, one on my own and a few Linux boxes under my desk.

Right now, they all got individual SSH keys because of me being a little paranoid.

But what is the best practice? Having one key per box? Having one key per physical user?

I mean, it would make things quite easy if "I" only had one key, but then again, it sounds too good to be true.

So what is the "right" approach of doing keys?

Thank you :)


1Password Version: Not Provided
Extension Version: Not Provided
OS Version: Not Provided
Browser: Not Provided

Comments

  • simonstiph
    simonstiph
    Community Member
    edited September 17

    I'm not an expert, but a very long time Linux user and soft. engineer. I've always done 1 private key per user per system. In other words, no user ever shares a key. 1Passwords obviously makes this 100x easier.