Skip to main content

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

2
  • There really isn’t a way to get around the permissions requirements on the key files. If the key files are not correct and owned by the user only the key file cannot be used
    – Ramhound
    Commented Mar 21, 2022 at 9:33
  • OpenSSH is quite clear on permissions of keys, as they should not be accessible to anyone but the user. Best way I've found to manage SSH keys is to use a YubiKey, storing the SSH key in the A[uthentication] slot (@user1686's Suggestion #4); while OpenSSH supports hardware keys, I'm unsure how to directly configure it to access a PAM without 3rd party software (gpg || Gpg4Win with Kleopatra loaded). @User1686's Suggestion #1 seems the simplest and most efficient way to go about this. General FYI: SSH key best practice is to encrypt the key, negating the need for an encrypted container.
    – JW0914
    Commented Mar 21, 2022 at 11:28