Jon Portnoy > App-authkeymgr > authkeymgr

Download:
App-authkeymgr-0.011.tar.gz

Annotate this POD

View/Report Bugs
Source  

NAME ^

authkeymgr - Interactively manage SSH authorized_keys files

SYNOPSIS ^

  ## Invocation:
  authkeymgr
  authkeymgr --keydir=/path/to/pubkey/root
  
  ## Get more extensive help:
  keymgr> help
  
  ## Add a user:
  keymgr> adduser joe

  ## Give them keys:
  keymgr> addkey joe
  
  ## Perhaps select one to revoke for now:
  keymgr*> revoke joe
  
  ## Restore a key:
  keymgr*> restore joe

  ## Build a new authorized_keys:
  keymgr*> build
  ...
  keymgr>

DESCRIPTION ^

authkeymgr provides an interactive interface to managing sets of public keys and subsequently rebuilding authorized_keys files for OpenSSH.

Defaults to storing users/keys in $HOME/.ssh/pubkeys -- you can specify a different keydir via --keydir

This approach generally assumes that your public keys are organized by user; for example, I use something like the following approach:

  ## Add a couple systems
  keymgr> adduser rakshasa
  keymgr> adduser typhon
  ## Add some keys for them
  keymgr> addkey rakshasa avenj-rakshasa.pub avenj.pub
  keymgr*> addkey rakshasa devel-rakshasa.pub devel.pub
  keymgr*> addkey typhon avenj-typhon.pub avenj.pub
  ## Rebuild authorized_keys
  keymgr*> build
  keymgr>

Command arguments can be quoted.

Try help from the keymgr prompt for extended usage information.

See perldoc authkeys-rebuild if you'd rather manage key sets manually.

AUTHOR ^

Jon Portnoy <avenj@cobaltirc.org>

syntax highlighting: