{% extends "index.html" %} {% load i18n %} {% block menu %} {% with current_category="home" %} {{ block.super }} {% endwith %} {% endblock %} {% block content %} {% blocktrans %}
With skd it is easy to control the public keys in your environment, granting users the access to hosts they only should have access to.
It binds keys to users, users to groups and groups to a group of hosts.
So the "DMZ"-Admin group has the full access to all hosts in the DMZ. And any new user only needs to be set up and added to the DMZ-Group to auto- matically have all access.
And revoking access is also as simple as removing the user from a group or deleting the user as a whole.
skd generates a private/public key pair upon first setup. The public key can directly be copied to the authorized_keys-file on a newly created machine after a first password-based authentication. The private key is stored within the skd-database. So you should keep that database on a secure location. But even if the key is corrupt, skd can generate a new key, transport that key and remove the old key from the systems.
Choose one of the menu entries on the left.
{% endblocktrans %} {% endblock %}