Timeline for How to Manage SSH Key Permission in NTFS When Sharing Among Multiple System
Current License: CC BY-SA 4.0
6 events
when toggle format | what | by | license | comment | |
---|---|---|---|---|---|
Mar 21, 2022 at 11:28 | comment | added | JW0914 |
OpenSSH is quite clear on permissions of keys, as they should not be accessible to anyone but the user. Best way I've found to manage SSH keys is to use a YubiKey, storing the SSH key in the A[uthentication] slot (@user1686's Suggestion #4); while OpenSSH supports hardware keys, I'm unsure how to directly configure it to access a PAM without 3rd party software (gpg || Gpg4Win with Kleopatra loaded). @User1686's Suggestion #1 seems the simplest and most efficient way to go about this. General FYI: SSH key best practice is to encrypt the key, negating the need for an encrypted container.
|
|
Mar 21, 2022 at 10:05 | answer | added | grawity_u1686 | timeline score: 2 | |
Mar 21, 2022 at 9:33 | comment | added | Ramhound | There really isn’t a way to get around the permissions requirements on the key files. If the key files are not correct and owned by the user only the key file cannot be used | |
Mar 21, 2022 at 8:16 | history | edited | nobody-74185 | CC BY-SA 4.0 |
added 82 characters in body
|
S Mar 21, 2022 at 6:30 | review | First questions | |||
Mar 21, 2022 at 6:47 | |||||
S Mar 21, 2022 at 6:30 | history | asked | nobody-74185 | CC BY-SA 4.0 |