Skip to content

Keys

The Keys section provides a unified inventory of all discovered SSH keys, including managed, rogue, and duplicate keys.

All SSH Keys

The table displays:

ColumnDescription
TypeAlgorithm type (RSA, ED25519, ECDSA, UNKNOWN)
OwnerFile owner (user account)
PathFile location on the host
FingerprintUnique SHA-256 identifier
CreatedKey creation timestamp
StatusManaged, Unmanaged, Rogue

Quick filters allow switching between:

  • All
  • Managed
  • Unmanaged

Rogue keys are unauthorized or policy-violating SSH keys detected in the environment.

Rogue SSH Keys

A key is considered rogue when:

  • It grants unauthorized access
  • It violates policy requirements
  • It is manually flagged during review

Rogue keys are visually highlighted for immediate investigation.


Duplicate keys share the same fingerprint across multiple hosts, indicating shared credentials.

Duplicate SSH Keys

Duplicate detection is fingerprint-based and identifies:

  • Same key deployed on multiple systems
  • Shared private key usage
  • Increased lateral movement risk

Click any key to view:

  • Algorithm and fingerprint
  • File location and owner
  • Host association
  • Discovery timestamps
  • Current status

Managed – Approved and compliant key
Unmanaged – Discovered but not reviewed
Rogue – Unauthorized or policy-violating key


  • Search by fingerprint, owner, path, or type
  • Manual refresh available
  • Pagination controls for large inventories