NAME

authkeymgr - Interactively manage SSH authorized_keys files

SYNOPSIS

## Invocation:
authkeymgr
authkeymgr --keydir=/path/to/pubkey/root

## Get more extensive help:
keymgr> help

## Add a user:
keymgr> adduser joe

## Give them keys:
keymgr> addkey joe

## Perhaps select one to revoke for now:
keymgr*> revoke joe

## Restore a key:
keymgr*> restore joe

## Build a new authorized_keys:
keymgr*> build
...
keymgr>

DESCRIPTION

authkeymgr provides an interactive interface to managing sets of public keys and subsequently rebuilding authorized_keys files for OpenSSH.

Defaults to storing users/keys in $HOME/.ssh/pubkeys -- you can specify a different keydir via --keydir

This approach generally assumes that your public keys are organized by user; for example, I use something like the following approach:

## Add a couple systems
keymgr> adduser rakshasa
keymgr> adduser typhon
## Add some keys for them
keymgr> addkey rakshasa avenj-rakshasa.pub avenj.pub
keymgr*> addkey rakshasa devel-rakshasa.pub devel.pub
keymgr*> addkey typhon avenj-typhon.pub avenj.pub
## Rebuild authorized_keys
keymgr*> build
keymgr>

Command arguments can be quoted.

Try help from the keymgr prompt for extended usage information.

See perldoc authkeys-rebuild if you'd rather manage key sets manually.

AUTHOR

Jon Portnoy <avenj@cobaltirc.org>