CloudGate Key Manager / CloudGate Key Manager Features

cloudgate key manager main features
control the lifetime
of your keys
CloudGate Key Manager lets you control the lifetime of your users’ SSH keys by configuring a key rotation policy. Specifying a short-lived key validity period forces users to generate a new key pair on a monthly, weekly, daily, or even hourly basis, thus reducing the risk of state keys finding their way out of the organization.
In addition, removal or suspension of a user will immediately result in the revocation of this user’s keys, and individual keys can be manually revoked in case they are compromised by theft or loss.


control the lifetime
of your keys
CloudGate Key Manager lets you control the lifetime of your users’ SSH keys by configuring a key rotation policy. Specifying a short-lived key validity period forces users to generate a new key pair on a monthly, weekly, daily, or even hourly basis, thus reducing the risk of state keys finding their way out of the organization.


implement fine-grained
access control
CloudGate Key Manager allows you to define attribute-based access control (ABAC) policies for users, groups, organizational units or any combination thereof.
Using these policies, you can limit the instances that can be accessed by selected entities through a powerful logic tree. This logic tree lets you define any possible combination of instance attributes and allows you to restrict the range of accessible instances to a given cloud environment, region, instance type, or even to a specific instance ID, host name, account, or tag.

implement fine-grained
access control

enforce strong authentication with cloudgate uno
CloudGate Key Manager does not store any private keys, nor does it keep them in memory.
After authenticating, generation of the key pair is triggered by the individual user, after which the private key is presented to the user for a one time download.
Since authentication for both users and administrators is handled by CloudGate UNO single sign-on, administrators can take advantage of CloudGate’s security profiles to set up strong authentication for their users, and prevent keys from falling in the hands of unauthorized parties.

Ready to get started?
Streamline the management of your SSH keys today.