Use cases
This page describes some of the possible use-cases where SSH Key Verification can be used for.
2-Factor Authentication
SSH Key Verification can be used for 2-factor authentication. When a user logs in to a website, a command is returned to the user. When the user executed the command, their SSH keys are checked, and the 2-FA has succeeded.
Verify Server Access
SSH Key Verification can be used to check if a user has access to one or more keys of the authorized_keys file of an
SSH server.
An example of this implementation is sshauthorizedkeys.com
Verify unused keys
SSH Key Verification can be used to check if an authorized_keys file does not contain any unused keys. Each user of
the server can be asked to connect to the Connection Identifier. Any keys that have not been verified, are not needed
anymore.
An example of this implementation is sshauthorizedkeys.com