SSH Deployment Security Setup
Secure SSH deployment: generate key pairs, create passphrases, and set up key fingerprint verification.
Quando usar esta receita
Set up SSH keys for CI/CD deployment pipelines. Secure key pairs with passphrases and fingerprint verification to prevent unauthorized server access.
Etapas
SSH Key Generator
Experimente esta ferramenta →Generate deployment key
Passphrase Generator
Experimente esta ferramenta →Create key passphrase
Hash Calculator
Experimente esta ferramenta →Create key fingerprint
Perguntas frequentes
Should CI/CD SSH keys have passphrases?
For interactive use, yes. For automated CI/CD, a passphrase complicates automation. Instead, use deploy keys with restricted permissions, IP allowlisting, and short-lived certificates.
How do I restrict SSH key access?
Use authorized_keys options: command restriction (force specific command), from restriction (IP whitelist), no-port-forwarding, and no-X11-forwarding. Principle of least privilege.
Receitas relacionadas
Secure Password Workflow
Generate a strong password, verify its strength, and hash it for storage — a complete password security pipeline.
Web Security Header Audit
Audit your website's security headers, generate a CSP policy, evaluate it, and configure CORS.
JWT Authentication Setup
Set up JWT-based authentication: generate tokens, create signing keys, and implement TOTP for 2FA.
API Security Hardening
Harden your API with HMAC request signing, secure secrets, and SRI for client-side integrity.