Analyzing and fixing SSH violations
You can take a number of actions to resolve SSH trust violations. This section describes common violations and the recommended steps to resolve them.
All supported SSH violations are resolved using one or more of the following remediation tasks:
- Remove keys (orphans, authorized keys with root access, excessive number of keys, replace, if obsolete, remove RSA1 and create RSA/DSA instead)
- Remove keyset (and create new one in its place)
- Add self-service key mappings
- Locate SSH servers and scan for keys
- Add policy settings (flag duplicate private keys, set minimum key length, and flag SSHv1)
- Split keyset into two keysets
- Specify (correct) forced commands
- Fix source restrictions
- Add missing options
- Rotate keys (and set a schedule for auto rotation)
TIP To browse topics in this section, use the menu on the left side of this page.