Why not adopt me?
This distribution is up for adoption!
If you're interested then please contact the PAUSE module admins via
email.
NAME
authkeymgr - Interactively manage SSH authorized_keys files
SYNOPSIS
## Invocation:
authkeymgr
authkeymgr --keydir=/path/to/pubkey/root
## Get more extensive help:
keymgr> help
## Add a user:
keymgr> adduser joe
## Give them keys:
keymgr> addkey joe
## Perhaps select one to revoke for now:
keymgr*> revoke joe
## Restore a key:
keymgr*> restore joe
## Build a new authorized_keys:
keymgr*> build
...
keymgr>
DESCRIPTION
authkeymgr provides an interactive interface to managing sets of public keys and subsequently rebuilding authorized_keys
files for OpenSSH.
Defaults to storing users/keys in $HOME/.ssh/pubkeys
-- you can specify a different keydir via --keydir
This approach generally assumes that your public keys are organized by user; for example, I use something like the following approach:
## Add a couple systems
keymgr> adduser rakshasa
keymgr> adduser typhon
## Add some keys for them
keymgr> addkey rakshasa avenj-rakshasa.pub avenj.pub
keymgr*> addkey rakshasa devel-rakshasa.pub devel.pub
keymgr*> addkey typhon avenj-typhon.pub avenj.pub
## Rebuild authorized_keys
keymgr*> build
keymgr>
Command arguments can be quoted.
Try help from the keymgr prompt for extended usage information.
See perldoc authkeys-rebuild if you'd rather manage key sets manually.
AUTHOR
Jon Portnoy <avenj@cobaltirc.org>