SSH Keys
  • 1 minute to read
  • Dark
  • PDF

SSH Keys

  • Dark
  • PDF

Article Summary

Within the PAM module, it is possible to add SSH keys to allow management by senhasegura. This integration makes it possible to start sessions using these keys and allows them to be modified according to the rules of the established password policy.

SSH keys are replicated on several devices with specific characteristics governed by careful technical specifications. Therefore, it is essential to manage them separately and dedicatedly, independently of other information.

The SSH key registration form is similar to the credentials registration form. However, the applied password policy is specific to issuing the key password.


The interface does not provide a means to create the key, but it does provide the option to configure it to be recreated with or without a random password.

Certified operating systems

senhasegura has the following operating systems certified for SSH key rotation:

  • CentOS 4/5/6/7
  • Debian 5/6/7/8/9/10
  • Windows Server 2000/2003/2008/2012/2016
  • Windows XP/Vista/7/8/10
  • RHEL 3/4/5/6/7/8
  • Ubuntu 16.04/17.10


  1. How to setup an SSH key
  2. How to perform remote access with SSH key.
  3. How to rotate SSH keys.

Do you still have questions? Reach out to the senhasegura Community.

Was this article helpful?