SSH Deployment Security Setup
Secure SSH deployment: generate key pairs, create passphrases, and set up key fingerprint verification.
Cuándo usar esta receta
Set up SSH keys for CI/CD deployment pipelines. Secure key pairs with passphrases and fingerprint verification to prevent unauthorized server access.
Pasos
SSH Key Generator
Probar esta herramienta →Generate deployment key
Passphrase Generator
Probar esta herramienta →Create key passphrase
Hash Calculator
Probar esta herramienta →Create key fingerprint
Preguntas frecuentes
Should CI/CD SSH keys have passphrases?
For interactive use, yes. For automated CI/CD, a passphrase complicates automation. Instead, use deploy keys with restricted permissions, IP allowlisting, and short-lived certificates.
How do I restrict SSH key access?
Use authorized_keys options: command restriction (force specific command), from restriction (IP whitelist), no-port-forwarding, and no-X11-forwarding. Principle of least privilege.
Recetas relacionadas
Secure Password Workflow
Generate a strong password, verify its strength, and hash it for storage — a complete password security pipeline.
Web Security Header Audit
Audit your website's security headers, generate a CSP policy, evaluate it, and configure CORS.
JWT Authentication Setup
Set up JWT-based authentication: generate tokens, create signing keys, and implement TOTP for 2FA.
API Security Hardening
Harden your API with HMAC request signing, secure secrets, and SRI for client-side integrity.