|SSH Key Management||SSH Command Whitelisting|
|Automatically rotate SSH Keys in Secret Server and target systems||Allow SSH Keys to be checked-out when access is needed to a system||Maintain better control over the use of Sudo and Su commands on Unix systems||Combine with session recording to maintain audit trails of commands used|
|Maintain unique keys for each of your systems, to limit lateral threat movements||Generate new SSH Key pairs whenever needed, on demand or on schedule||Improve administrative delegation on Unix systems with Secret Server||Help facilitate a move to least privilege by only providing users with the commands they need|
Private keys must be protected at all cost. If compromised they give a malicious user complete and uncontrolled access to any system that has a stored corresponding public key. These keypairs are often left unchanged for months or even years (if ever changed at all). Unix Protection from Thycotic ensures you can generate, store, protect, and manage your SSH Keys directly within Secret Server.
Root accounts on a Unix-based system provide a lot of power to a single administrator. With SSH Command Whitelisting, you can create a list of allowed commands by each administrator, ensuring that even root accounts are limited.