Keyset details

The keyset details page shows the trust relationships and accounts that are linked to a keyset in the SSH inventory in SSH Protect. Access this page by clicking on an access link in the SSH Keyset Inventory.

At the top of the keyset details page you see the following information:

  • Keyset Type - Either User (keys used for interactive and service user authentication) or Host (keys used for host identity).
  • Algorithm - The encryption algorithm used to generate the keyset.
  • Length - The length of the key, which directly corresponds to the strength of the key.
  • Keyset ID - A unique identifier for the keyset.

The tabs of the keyset details page are: (1) Keyset details; (2) Private Keys; (3) Authorized Keys (or Known Host Keys); and (4) Permissions. Each of these tabs is described in more detail in the sections below.