+1-202-802-9399 (US)



Generate, store, rotate and manage sensitive SSH Keys.


While Windows machines are constantly the center of security attention, more organizations are deploying Unix machines. The Unix/Linux operating systems are free, and easy to spin up multiple systems for very little cost. Access to these systems are typically done over SSH using a private/public keypair. This file based authentication system can provide a single user’s private key with access to any number of machines that have the corresponding public keys. Often, these keypairs are used for multiple machines and rarely ever rotated.


Without rotating SSH Keys, or really understanding what systems they are on, it’s impossible to have a complete idea of the access level of every user in your network. If a single Private Key is compromised, it could provide a malicious user uncontrolled access to any corresponding Unix system without any type of warning. Additionally, providing 3rd party organizations access to Unix systems is difficult, as it requires the generation and use of a keypair that may not be protected by the third party.


SSH Key Management for Secret Server allows you to bring the generation, rotation, control, and protection of SSH Keys directly into Secret Server.  With Role Based Access Control and permission sets, you can control who has access to which sets of keys for each of your Unix based endpoints. Tie in these keys to access workflows such as “Secret Checkout”, and you can finally provide 3rd party access to your Unix systems without worry of the key being compromised.

Secret Server enables you to rotate these key pairs on demand or on schedule, updating them within Secret Server and on every endpoint that they are used.  With a complete audit history available, you can also quickly show auditors that access to these systems is controlled, managed, and monitored every second of every day.

TRY IT FREE FOR 30 DAYS. It’s fast to install and easy to use!
Start your free trial of Secret Server using the trial form,
or view Secret Server’s full list of user-friendly features.

VIDEO – Using the Secret Server SSH Key Management feature:

Additional Information

SSH Key Management is part of the Unix Protection add-on pack.

SSH Keys are largely left unprotected beyond a simple passphrase.

With the SSH key manager feature in Secret Server you can:

  • Generate new SSH Key Pairs
  • Store your SSH Keys in an encrypted vault
  • Rotate your SSH Keys on all of your endpoints that use keys for authentication
  • Audit the ownership and use of all keys across your organization
  • Centralize your SSH Key management process

One last thing, if secure and efficient SSH Key management is important to you, then you’ll love our Session Control feature for recording and monitoring sessions, and recording keystrokes >

Start Your 30-Day Free Trial

  • Full featured, 30-day trial
  • Free enterprise-level support
  • Unlimited Secrets
  • Up and running in 15 mins

By completing this form you are opting into emails from Thycotic. You can unsubscribe at any time.