Question/Feature Request: Active/Inactive SSH Keys per Machine
Hello!
I'm starting a new position today, and I'd like to continue to use 1Password for all the various things it does.
One problem that I'm currently facing is that I don't want to expose/leak/use/whatever the SSH keys that I've already established within 1Password. Ideally, I'd make a new key that I would use only my new work computer - but I don't think that's currently possible with 1Password, or am I missing something?
Thanks in advance.
1Password Version: Not Provided
Extension Version: Not Provided
OS Version: Not Provided
Browser: Not Provided
Comments
-
Not sure this if this what you're asking about, but I use many SSH keys with 1Password. It's possible to control which SSH key is used for which account (user@host) by configuring them in
~/.ssh/config
file. In fact, this isn't a feature specific to 1Password. It's how SSH works.For more details on the
~/.ssh/config
file:
https://linux.die.net/man/5/ssh_configI typically specify keys using
IdentityFile
option in~/.ssh/config
to identify the SSH public key I'm using for a specific user and host, with the private key stored securely in 1Password.Depending on what you're looking to do, it might be possible using
~/.ssh/config
.0