Skip to main content
USENIX
  • Conferences
  • Students
Sign in
  • Overview
  • Conference Organizers
  • Registration Information
    • Registration Discounts
    • Hotel and Travel Information
    • Live Streaming
  • Purchase the Box Set
  • Why Attend LISA '13?
    • Watch the Video
  • Convince Your Boss
  • Program
    • At a Glance
    • Calendar
    • Training Program
    • Technical Sessions
    • Invited Speakers
    • Workshops
    • Conference Themes
  • Co-located Events
    • SESA '13
    • Gluster Community Day
    • Puppet Camp DC
    • Data Storage Day
    • Build a Cloud Day
  • Students and Grants
  • Sponsorship and Exhibition
    • Sponsors and Exhibitors
    • Vendor Exhibition
    • Exhibitor Services
    • Download Prospectus
  • Call for Participation
  • For Participants
    • Speaker Resources
  • Help Promote!
    • Flyer PDF
    • Brochure PDF
  • Activities
    • Birds-of-a-Feather Sessions
    • Poster Session
    • Lightning Talks Sign Up Form
    • LISA Lab Hack Space
  • Services
  • Questions
  • Past Conferences

sponsors

Gold Sponsor
Gold Sponsor
Silver Sponsor
Silver Sponsor
Silver Sponsor
Silver Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
General Sponsor
General Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Industry Partner
Industry Partner
Industry Partner
Industry Partner

twitter

Tweets by @LISAConference

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home » Managing Access Using SSH Keys
Tweet

connect with us

http://www.facebook.com/LISAConf
http://twitter.com/LISAConference
http://www.linkedin.com/groups?home=&gid=49559
https://plus.google.com/108588319090208187909/posts
http://www.youtube.com/user/USENIXAssociation

Managing Access Using SSH Keys

Linux

Tatu Ylönen, SSH Communications Security, and Inventor of SSH

Abstract: 

SSH user keys are ubiquitously used for accessing information systems by automated processes and system administrators. Many large organizations have hundreds of thousands of keys granting access, with many keys providing privileged access without auditing or controls. The talk educates the audience about risks arising from unmanaged access using SSH keys; discusses what is required by compliance mandates; outlines how to establish effective operational processes for provisioning, terminating, and monitoring SSH user key based access; and outlines how to understand and remediate SSH user keys in an existing environment.

Mr. Ylönen invented the Secure Shell (SSH) protocol in 1995 and is founder and CEO of SSH Communications Security. OpenSSH is based on his free version of 1995. He has 29 years of programming and systems management experience and plenty of business management background. He co-authored the IETF guidelines on SSH key management for automated access and is a co-author in upcoming NIST IR series guidelines for managing access using SSH keys. Mr. Ylönen and his company have been deeply involved in several actual SSH key remediation and management projects with some of the leading financial institutions and other enterprises.

Open Access Media

USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.

View the slides

Presentation Video

Presentation Audio

MP3 Download OGG Download

Download Audio

  • Log in or    Register to post comments

Gold Sponsors

Silver Sponsors

Bronze Sponsors

General Sponsors

Media Sponsors & Industry Partners

© USENIX

LISA is a registered trademark of the USENIX Association.

  • Privacy Policy
  • Contact Us