SSH Key Inventory Auditor

Paste your public keys from authorized_keys or ssh-keyscan output. Get a full security audit.

Algorithm distribution

Strength assessment

Key inventory

#AlgorithmBitsCommentFingerprint (SHA256)StrengthIssues

Audit findings & recommendations

See how OnePAM automates this

Eliminate SSH key sprawl — OnePAM uses certificate-based, short-lived credentials that auto-rotate. No keys to distribute, track, or revoke.

Start Free Trial