Key Management
Key management is used to manage SSH keys, supporting passwordless login using keys.
Adding Keys
Click "Key Management" in the left menu to enter the key management page. Click the "Add Key" button to open the add key dialog:
Fill in Key Information
| Field | Description | Required |
|---|---|---|
| Key Name | Set a name for the key | Yes |
| Private Key | Manually enter the private key content, or click "Drag private key file here to import" below to import a local key file | Yes |
| Public Key | Manually enter the public key content | No |
| Private Key Password | Enter the password for the private key (if the private key has a password set) | No |
Import Methods
Method One: File Import
- Drag the private key file directly to the specified area
- The system automatically identifies the key format and type
- Supports formats such as
.pem,.key,.rsa,id_rsa, etc.
Method Two: Manual Input
- Paste the complete private key content in the private key input box
- Format example:
-----BEGIN RSA PRIVATE KEY----- ... -----END RSA PRIVATE KEY-----
After filling in the information, click "Create" to add the key.
Managing Keys
In the key list, you can view all added keys. Click on a key item to view detailed information, or perform edit or delete operations.
Using Keys
Keys can be used for:
- Selecting key authentication when adding hosts: When adding a host, select "Key Authentication" as the authentication method, then select an already added key from the dropdown list
- Automatically using keys for authentication when connecting to hosts: For hosts configured with key authentication, the corresponding key will be automatically used for authentication when connecting
Editing Keys
- Click the "Edit" button in the key list
- Modify the key name or update the key content
- Changes take effect immediately after saving
Deleting Keys
- Select the key to delete
- Confirm the delete operation
- The key will be permanently removed
Notes
Before deleting a key, please ensure:
- The key is not being used by other hosts
- Important key information has been backed up
- You understand that the delete operation is irreversible
Best Practices
Key Naming Conventions
Set clear names for keys to facilitate identification and management:
Personal Server KeyCompany Production Environment KeyDevelopment Test Environment Key
Key Security
- Regularly rotate keys
- Do not share private key content with others
- Set password protection for private keys
- Safely store private key files
Key Backup
It is recommended to regularly backup important key files to avoid being unable to connect to servers due to key loss.