Keystash

Keystash

Keystash is a secure, cloud-based solution for managing SSH keys and user access across Linux infrastructures.

Location: United Kingdom
Software Type: Web App

Need help?

We can help you find specialists for Keystash. Let us connect you with the right experts to assist you.

*User registration required

Are you an expert in Keystash?

Description

Keystash is a comprehensive cloud-based platform designed for SSH key and Linux user management. It provides an intuitive interface for managing SSH keys, including the ability to upload existing keys, generate new ones, and distribute or revoke keys easily across server infrastructures.

Key Features:
- SSH Key Management: Centralized management of SSH keys, allowing for easy uploads, generation, and revocation.
- User Management: Robust features for Linux user and group management, ensuring appropriate access control.
- SSH Two-Factor Authentication (2FA): Enhanced security for user access.
- Audit Logs: Comprehensive tracking of user activities to ensure compliance and security.
- API Access: Powerful API for automation and integration with other systems.
- Server Inventory: Monitoring and management of server details across infrastructures.
- Customizable Roles and Permissions: Flexible access control according to organizational needs.

Keystash supports multi-cloud and private cloud environments, making it suitable for organizations of all sizes. The platform is compliant with several IT security frameworks like ISO27001, SOC2, PCI-DSS, and HIPAA, aiding in meeting data privacy regulations such as GDPR and CCPA. It is available on a month-to-month contract basis with no lock-in required, offering a free tier alongside scalable pricing.

Features

SSH Key Management

Easily upload, generate, and manage SSH keys across your server infrastructure.

User Management

Manage Linux users and groups, and customize access permissions.

Two-Factor Authentication

Implement SSH two-factor authentication for an added layer of security.

Audit Logs

Comprehensive logs to track user activity and ensure compliance.

Customizable Roles

Create and manage roles tailored to your organization's access requirements.

API Access

Leverage the API for automation and integration with existing systems.

Server Inventory

Monitor and manage server details for better oversight of resources.

Tags

SSHsecurityuser managementLinuxcloud management

Documentation & Support

  • Installation
  • Documentation
  • Support
  • Updates