SSH Keys by Age
The SSH The SSH (secure shell) protocol provides for secure connections between computers. It provides several options for authentication, including public key, and protects the communications with strong encryption. Keys by Age report shows one or more table(s) with detailed information for SSH keys generated in Keyfactor Command broken down by age—as defined by the Key Lifetime (days) application setting (see Application Settings: SSH Tab).
The export options for the SSH Keys by Age report are PDF and Excel.
The report aging categories are:
- Stale keys (within the last 4 weeks)
- Keys less than 1 week from being stale
- Keys less than 4 weeks from being stale
- Keys less than 8 weeks from being stale
- Keys less than 6 months from being stale
- Keys less than 12 months from being stale
A table is only shown if an SSH key with one of the selected key types matches the age window. An SSH key appears only in one table, so, for example, a key that will become stale within 4 weeks and appears in the 4-week table does not also appear as becoming stale within the 8-week table.
The grid includes:
- Account Name
For user keys, the Active Directory user account associated with the key being reported on. For service account keys, the username and client hostnameThe unique identifier that serves as name of a computer. It is sometimes presented as a fully qualified domain name (e.g. servername.keyexample.com) and sometimes just as a short name (e.g. servername). entered when the service account key was created (e.g. myapp@appsrvr.keyexample.com).
- Creation Date
The date (in UTC time) on which the SSH key was created. - Fingerprint
The fingerprint of the SSH public keyIn asymmetric cryptography, public keys are used together in a key pair with a private key. The private key is retained by the key's creator while the public key is widely distributed to any user or target needing to interact with the holder of the private key..
- Key Type
The key type identifies the type of key to create when creating a symmetric or asymmetric key. It references the signing algorithm and often key size (e.g. AES-256, RSA-2048, Ed25519).
The key type of the SSH public key. - Key Length
The key size or key length is the number of bits in a key used by a cryptographic algorithm.
The key length of the SSH public key. - Associated Logons
The number of Linux logons associated with the SSH public key.
This report takes as an input parameter A parameter or argument is a value that is passed into a function in an application. the SSH Key Types to include in the report. You must select at least one key type using the Select SSH Key Types button.