Execute commands on multiple systems simultaneously. Upload files to selected systems. Once the sessions have been opened you can select a single terminal window or any combination to run your commands.
KeyBox works through the authorized_keys file on systems that are registered. Users can generate an SSH key and distribute to any systems set in their profile. Strong passphrases are enforced when keys are set to be generated through the application. Users with full-privileges may review and disable any administrative key forcing rotation.
With KeyBox users set or generate their own keys, discouraging private keys from being shared, sent over email, etc..
Create users and assign system profiles. Users can login to KeyBox via the web-console, but have limited privileges and can only access systems that have been assigned through their profile. System access can be removed at anytime removing any keys the user has associated with the system. Authentication may be integrated with LDAP in which roles can be mapped to profiles defined in KeyBox. Users will be added/removed from defined profiles as they login and when the role name matches the profile name.
Once enabled, users with full-privileges may audit other administrative user sessions. Ensure systems are managed within organizational guidelines. Through its logging utility, KeyBox can be configured to send logs to a central logging server. (eg. logstash)