
Automated SSH Key Management Using Custom Certificate Authority and Temporary Keys
Author(s) -
Amita Goel Kartik Behl
Publication year - 2020
Publication title -
international journal of modern trends in science and technology
Language(s) - English
Resource type - Journals
ISSN - 2455-3778
DOI - 10.46501/ijmtst061245
Subject(s) - cloud computing , computer security , computer science , encryption , server , certificate , public key cryptography , key (lock) , access control , world wide web , operating system , algorithm
In this era of massive knowledge, cloud computing has emerged as one of the most on-demandaccessibility of computing system resources, a plan that modified the ways of computing. However, datasecurity remains a tangle in creating cloud computing vulnerable. Therefore, SSH users and businessesvictimization SSH coding should do everything necessary to shield the safety of their SSH encryption keysand different components so as to uphold the trust placed within the system. SSH keys automate the mannerof stable get admission to servers, bypassing the want to manually input log-in credentials. SSH is likewiseimmune to brute pressure assaults and protects against sure assault vectors getting used to advantage getadmission to far off machines. The current research work carries out a detailed functioning of a publiclyavailable, fully managed and automated solution for secure management and distribution of SSH keys witha granular level access control which will prevent any potential leak of a private key.