Skip to Content
Nextra 4.0 is released šŸŽ‰

Use cases

This page describes some of the possible use-cases where SSH Key Verification can be used for.

2-Factor Authentication

SSH Key Verification can be used for 2-factor authentication. When a user logs in to a website, a command is returned to the user. When the user executed the command, their SSH keys are checked, and the 2-FA has succeeded.

Verify Server Access

SSH Key Verification can be used to check if a user has access to one or more keys of the authorized_keys file of an SSH server.

An example of this implementation is sshauthorizedkeys.com

Verify unused keys

SSH Key Verification can be used to check if an authorized_keys file does not contain any unused keys. Each user of the server can be asked to connect to the Connection Identifier. Any keys that have not been verified, are not needed anymore.

An example of this implementation is sshauthorizedkeys.com