Skip to content

Key Management

Key management is used to manage SSH keys, supporting passwordless login using keys.

Adding Keys

Click "Key Management" in the left menu to enter the key management page. Click the "Add Key" button to open the add key dialog:

Fill in Key Information

FieldDescriptionRequired
Key NameSet a name for the keyYes
Private KeyManually enter the private key content, or click "Drag private key file here to import" below to import a local key fileYes
Public KeyManually enter the public key contentNo
Private Key PasswordEnter the password for the private key (if the private key has a password set)No

Import Methods

Method One: File Import

  • Drag the private key file directly to the specified area
  • The system automatically identifies the key format and type
  • Supports formats such as .pem, .key, .rsa, id_rsa, etc.

Method Two: Manual Input

  • Paste the complete private key content in the private key input box
  • Format example:
    -----BEGIN RSA PRIVATE KEY-----
    ...
    -----END RSA PRIVATE KEY-----

After filling in the information, click "Create" to add the key.

Managing Keys

In the key list, you can view all added keys. Click on a key item to view detailed information, or perform edit or delete operations.

Using Keys

Keys can be used for:

  • Selecting key authentication when adding hosts: When adding a host, select "Key Authentication" as the authentication method, then select an already added key from the dropdown list
  • Automatically using keys for authentication when connecting to hosts: For hosts configured with key authentication, the corresponding key will be automatically used for authentication when connecting

Editing Keys

  • Click the "Edit" button in the key list
  • Modify the key name or update the key content
  • Changes take effect immediately after saving

Deleting Keys

  • Select the key to delete
  • Confirm the delete operation
  • The key will be permanently removed

Notes

Before deleting a key, please ensure:

  • The key is not being used by other hosts
  • Important key information has been backed up
  • You understand that the delete operation is irreversible

Best Practices

Key Naming Conventions

Set clear names for keys to facilitate identification and management:

  • Personal Server Key
  • Company Production Environment Key
  • Development Test Environment Key

Key Security

  • Regularly rotate keys
  • Do not share private key content with others
  • Set password protection for private keys
  • Safely store private key files

Key Backup

It is recommended to regularly backup important key files to avoid being unable to connect to servers due to key loss.

License