Question/Feature Request: Active/Inactive SSH Keys per Machine

whatsyourpassword
whatsyourpassword
Community Member

Hello!

I'm starting a new position today, and I'd like to continue to use 1Password for all the various things it does.

One problem that I'm currently facing is that I don't want to expose/leak/use/whatever the SSH keys that I've already established within 1Password. Ideally, I'd make a new key that I would use only my new work computer - but I don't think that's currently possible with 1Password, or am I missing something?

Thanks in advance.


1Password Version: Not Provided
Extension Version: Not Provided
OS Version: Not Provided
Browser: Not Provided

Comments

  • Michael Mercurio
    Michael Mercurio
    Community Member

    Not sure this if this what you're asking about, but I use many SSH keys with 1Password. It's possible to control which SSH key is used for which account (user@host) by configuring them in ~/.ssh/config file. In fact, this isn't a feature specific to 1Password. It's how SSH works.

    For more details on the ~/.ssh/config file:
    https://linux.die.net/man/5/ssh_config

    I typically specify keys using IdentityFile option in ~/.ssh/config to identify the SSH public key I'm using for a specific user and host, with the private key stored securely in 1Password.

    Depending on what you're looking to do, it might be possible using ~/.ssh/config.