Key Manager Logo

cloudgate key manager main features

CloudGate Key Manager reduces this risk and provides a secure audit trail for SOX compliance.

control the lifetime
of your keys

CloudGate Key Manager lets you control the lifetime of your users’ SSH keys by configuring a key rotation policy. Specifying a short-lived key validity period forces users to generate a new key pair on a monthly, weekly, daily, or even hourly basis, thus reducing the risk of state keys finding their way out of the organization.

 

In addition, removal or suspension of a user will immediately result in the revocation of this user’s keys, and individual keys can be manually revoked in case they are compromised by theft or loss.

Key Manager Illustration 1
Key Manager Illustration 2

control the lifetime
of your keys

CloudGate Key Manager lets you control the lifetime of your users’ SSH keys by configuring a key rotation policy. Specifying a short-lived key validity period forces users to generate a new key pair on a monthly, weekly, daily, or even hourly basis, thus reducing the risk of state keys finding their way out of the organization.

Key Manager Illustration 1
Key Manager Illustration 2
In addition, removal or suspension of a user will immediately result in the revocation of this user’s keys, and individual keys can be manually revoked in case they are compromised by theft or loss.

implement fine-grained
access control

CloudGate Key Manager allows you to define attribute-based access control (ABAC) policies for users, groups, organizational units or any combination thereof.

 

Using these policies, you can limit the instances that can be accessed by selected entities through a powerful logic tree. This logic tree lets you define any possible combination of instance attributes and allows you to restrict the range of accessible instances to a given cloud environment, region, instance type, or even to a specific instance ID, host name, account, or tag.

Key Manager Illustration

implement fine-grained
access control

CloudGate Key Manager allows you to define attribute-based access control (ABAC) policies for users, groups, organizational units or any combination thereof.
Key Manager Illustration
Using these policies, you can limit the instances that can be accessed by selected entities through a powerful logic tree. This logic tree lets you define any possible combination of instance attributes and allows you to restrict the range of accessible instances to a given cloud environment, region, instance type, or even to a specific instance ID, host name, account, or tag.

enforce strong authentication with cloudgate uno

CloudGate Key Manager does not store any private keys, nor does it keep them in memory.

 

After authenticating, generation of the key pair is triggered by the individual user, after which the private key is presented to the user for a one time download.

 

Since authentication for both users and administrators is handled by CloudGate UNO single sign-on, administrators can take advantage of CloudGate’s security profiles to set up strong authentication for their users, and prevent keys from falling in the hands of unauthorized parties.

Key Manager

Ready to get started?

Streamline the management of your SSH keys today.