SSH Key Inventory Auditor
Paste your public keys from authorized_keys or ssh-keyscan output. Get a full security audit.
Algorithm distribution
Strength assessment
Key inventory
| # | Algorithm | Bits | Comment | Fingerprint (SHA256) | Strength | Issues |
|---|
Audit findings & recommendations
Eliminate SSH key sprawl
OnePAM uses certificate-based, short-lived credentials that auto-rotate. No keys to distribute, track, or revoke.