SSH Key Usage
The SSH The SSH (secure shell) protocol provides for secure connections between computers. It provides several options for authentication, including public key, and protects the communications with strong encryption. Key Usage report shows a table which displays a list of SSH keys that have not been used to log on in the given minimum number of days.
The export options for the SSH Key Usage report are CSV and Excel.
The grid includes:
- Key Fingerprint
The fingerprint of the SSH public keyIn asymmetric cryptography, public keys are used together in a key pair with a private key. The private key is retained by the key's creator while the public key is widely distributed to any user or target needing to interact with the holder of the private key..
- Discovered Date
The date and time (in local server time) on which the SSH key was discovered. - Date Last Used
The date and time (in local server time) on which the SSH key was last used. - Key Length
The key size or key length is the number of bits in a key used by a cryptographic algorithm.
The key length of the SSH public key. - Logon Username
The Linux logon username associated with the key. - Logon Server
The IP address of the Linux server last used to logon.
This report takes as an input parameter A parameter or argument is a value that is passed into a function in an application.; number of Days Since Last Used. You must select a number between 0 and 100.