Automated SSH Key Management Using Custom
Certificate Authority and Temporary Keys
In this era of massive knowledge, cloud computing has emerged as one of the most on-demand accessibility of computing system resources, a plan that modified the ways of computing. However, data security remains a tangle in creating cloud computing vulnerable. Therefore, SSH users and businesses victimization SSH coding should do everything necessary to shield the safety of their SSH encryption keys and different components so as to uphold the trust placed within the system. SSH keys automate the manner of stable get admission to servers, bypassing the want to manually input log-in credentials. SSH is likewise immune to brute pressure assaults and protects against sure assault vectors getting used to advantage get admission to far off machines. The current research work carries out a detailed functioning of a publicly available, fully managed and automated solution for secure management and distribution of SSH keys with a granular level access control which will prevent any potential leak of a private key.