Confirmed users
502
edits
| Gdestuynder (talk | contribs) | Gdestuynder (talk | contribs)  | ||
| Line 213: | Line 213: | ||
| == Key generation == | == Key generation == | ||
| Large key sizes are used as SSH keys are not renewed very often (see also [[Security/Key_Management]]). | Large key sizes are used as SSH keys are not renewed very often (see also [[Security/Key_Management]]). | ||
| Don't hesitate to create multiple different keys for different usages. | |||
| <source code="bash"> | <source code="bash"> | ||
| Line 232: | Line 234: | ||
| * The recommended settings are identical to the user keys. | * The recommended settings are identical to the user keys. | ||
| * The keys must be accessible only by the admin user (root) and/or the system user requiring access. | * The keys must be accessible only by the admin user (root) and/or the system user requiring access. | ||
| Usage of machine keys should be registered in an inventory (a wiki page, ldap, an inventory database), to allow for rapid auditing of key usage across an infrastructure. | * Usage of machine keys should be registered in an inventory (a wiki page, ldap, an inventory database), to allow for rapid auditing of key usage across an infrastructure. | ||
| * The machine keys should be unique per usage. Each new usage (different service, different script called, etc.) should use a new, different key. | |||
| == SSH agent forwarding == | == SSH agent forwarding == | ||