Skip to content

Overview

Secure SSH identities across your infrastructure with centralized visibility and lifecycle governance.


Organizations struggle with:

  • Key sprawl across thousands of systems
  • Rogue and unauthorized keys
  • Orphaned access from former employees
  • No centralized audit trail
  • Long-lived static credentials

SSH-KLM implements a continuous lifecycle model:

Discovery → Correlation → Governance → Remediation

  • Lightweight agents discover SSH keys
  • The platform correlates fingerprints across hosts
  • Risks are automatically classified
  • Reports and remediation workflows enforce policy

┌─────────────────────────────────────────────────────────────────┐
│ Web Browser │
│ (Angular 20 Application) │
└────────────────────────────┬────────────────────────────────────┘
│ HTTPS
│ REST API
┌─────────────────────────────────────────────────────────────────┐
│ API Backend (Spring Boot) │
│ ┌──────────────┐ ┌──────────────┐ ┌──────────────┐ │
│ │ Controllers │ │ Services │ │ Repositories │ │
│ └──────────────┘ └──────────────┘ └──────────────┘ │
│ │ │ │ │
│ └──────────────────┴──────────────────┘ │
│ │ │
│ ▼ │
│ ┌──────────────┐ │
│ │ MongoDB │ │
│ │ (sshkeydb) │ │
│ └──────────────┘ │
└────────────────────────────┬────────────────────────────────────┘
│ HTTPS
│ REST API
│ (Agent Registration & Data)
┌─────────────────────────────────────────────────────────────────┐
│ Discovery Agent (Spring Boot) │
│ ┌──────────────┐ ┌──────────────┐ ┌──────────────┐ │
│ │ Discovery │ │ Scheduler │ │ API Comm │ │
│ │ Service │ │ Service │ │ Service │ │
│ └──────────────┘ └──────────────┘ └──────────────┘ │
│ │ │ │ │
│ └──────────────────┴──────────────────┘ │
│ │ │
│ ▼ │
│ ┌──────────────────────────┐ │
│ │ Local File System │ │
│ │ (~/.ssh/, /etc/ssh/) │ │
│ └──────────────────────────┘ │
└─────────────────────────────────────────────────────────────────┘
  • UI — Inventory, compliance, reporting
  • API — Business logic, scheduling, correlation
  • Database — Keys, hosts, audit logs
  • Agents — Secure discovery on endpoints

  • Fingerprint-based identity (SHA-256)
  • Agent-based distributed discovery
  • Role-based access control (RBAC)
  • Immutable audit logging
  • Secure mTLS agent communication