After the discovery and the management of the SSH resources, you can perform the following operations to manage the SSH keys:
The discovery and the subsequent connectivity establishment and credential supply processes enumerate the SSH keys associated with the resources. You are now required to import the keys to Key Manager Plus
As mentioned in section 4 of manage SSH resources, Key Manager Plus requires SSH user credentials for SSH key management. If the credentials are in place, you can import the SSH keys already discovered. To import the key files from the discovered SSH resource:
The imported keys can be viewed from the SSH >> SSH Keys tab.
Note : If the keys are protected with a passphrase, even though the import operation will execute successfully, while associating with user accounts, you need to enter the passphrase to use the key.
In addition to the automated discovery of key files from the SSH servers, you can also specify the location and import the keys present in any system. To import the key files from the system, do the steps that follow:
Note: You can either import SSH keys from systems individually or in bulk. If you opt for the individual import process, enter the passphrase of the respective SSH key. For the bulk import process, the selected SSH keys should either share the same passphrase or should be passphrase-free.

Note : If the key is protected with a passphrase, then the same has to be entered to import the key successfully.
To edit a Key Comment in already imported keys, follow the below steps:

Note: Key Comment can be edited for only one key at a time.
Key Manager Plus also allows you to create new key pairs and deploy them on target systems. The create and deploy feature of Key Manager Plus can be used for one click generation and deployment of keys. Unique key pairs are generated for each user account and the corresponding keys are deployed automatically in user accounts of the target servers.
The SSH key pair can be generated using the algorithms as per the details below:
To create new keys:
You will get confirmation that the new key has been created.
All the keys that are created are automatically added to the centralized repository of Key Manager Plus. You can view these keys from the SSH >> SSH Keys tab in the user interface. KMP allows you to search SSH Keys using Key Name, Key Type, Key Length, Finger Print, Created By, Age and additional fields.
To view key passphrase:
Administrators can view the passphrases of keys by clicking on the show passphrase icon (
) provided at the right end of the keys.
To create and associate keys with all the user accounts in a discovered resource:
Note: For security reasons root user login might be disabled for servers/machines. Enabling this option elevates a user login from a non-root user to a root user and allows you to associate keys to all other users in the server. Users have to provide root user and any non-root user credentials to KMP to elevate to a root user.

After importing / creating keys, you can associate the keys with SSH users.
Note :
To associate the created or imported keys with the user accounts of a single resource:
You will get a confirmation message that the key association has started and you will be redirected to the Key Association Audit page.
To select a SSH key and associate it directly with the user accounts:
Note: For security reasons root user login might be disabled for servers/machines. Enabling this option elevates a user login from a non-root user to a root user and allows you to associate keys to all other users in the server. Users have to provide root user and any non-root user credentials to KMP to elevate to a root user.

Keys can also be created and simultaneously associated with the user accounts. To do this:
Note: For security reasons root user login might be disabled for servers/machines. Enabling this option elevates a user login from a non-root user to a root user and allows you to associate keys to all other users in the server. Users have to provide root user and any non-root user credentials to KMP to elevate to a root user.
You can configure Key Manager Plus to automatically rotate the SSH keys at periodic intervals. With a single click, all the deployed keys can be replaced. The keys can be rotated based on a schedule, or anytime based on your need.
To rotate the keys manually:
A confirmation message will be displayed and you will be redirected to the Key Rotation Audit page where the status of rotation is updated.
Note : Only the keys which have already been associated with user accounts of resources can be rotated.
To schedule the rotation of keys:
The result of the schedule execution will get updated in the Schedule audit and the result of the rotation of the keys will get updated in the Key Rotation Audit.
When a SSH user leaves the organization or is provided temporary privileged access, you can dissociate the keys associated with the user to and discontinue access. Until you dissociate all the SSH keys, you cannot delete the user account nor the resource.
To select the keys and dissociate it from the users accounts:

To select the user accounts and dissociate keys from it:
Note : When you select and delete the user accounts enumerated in Key Manager Plus, the SSH keys associated with them are automatically dissociated.
In addition to deployment, Key manager Plus allows you to push a private key or a public key or both onto its associated users.
To push a key file to remote user accounts,
This feature is also available as a part of Key Rotation schedule. After the scheduled key rotation is performed and fresh key pairs are created and deployed, you can automatically push either the private key or both the private and public keys onto its selected associated users by enabling the 'push key to user' option instead of pushing the key files manually after every scheduled rotation.
Add commands and restrict host per key
You can add commands to specific user accounts, thereby providing an additional layer of restriction enabling them to only execute the commands on establishing connection with the host. Also you can predefine appropriate key to user relationship by specifying the IP address of the user in the appropriate format (as specified below).
To add command to a public key,
To restrict hosts for a key, click on Add Command and provide the name or IP addresses of the hosts in the following format. i.e.,(from="host1/ip1,host2/ip2")
You can fetch authorized_keys files from various user accounts, edit the key content and push them to respective user accounts from Key Manager Plus.
To do this,

You can securely transfer files from your system to specific user accounts using Secure Copy Protocol (SCP) in Key Manager Plus. To perform secure file transfer,
Note :
When you try to delete the SSH keys from Key Manager Plus repository, they are first dissociated automatically from their user accounts. Key deletion fails for the SSH keys that are not dissociated from all their user accounts.
To delete the SSH Keys:
Once you have associated a key with the respective user accounts, you can launch direct connection to the server via Key Manager Plus. You can connect directly from the SSH >> SSH Users tab, by clicking the Connect icon against the required user. You can also navigate to the SSH >> SSH Servers, or the SSH >> SSH Keys tabs, and drill down to the user accounts associated, and then click the Open Connection icon.
A new window will open up with connection established with the required server, using the selected user account.