Your browser does not allow storing cookies. We recommend enabling them.

SSH APIs and Connectors

SSH Communications Security products offer comprehensive APIs for integrating with identity and access management, configuration management databases, workflow and ticketing systems, security incident and event management, privilege escalation, data loss prevention and various other protocols.

Almost all information in the system can be extracted using the APIs for external reporting. It also means that there is no vendor lock-in. Most data items can also be entered into the system via the API, meaning it is possible to transfer data from other systems into SSH One.

It also supports APIs and connectors for extending the products. These could be used, for example, for intefacing with new mechanisms for scanning SSH keys on hosts and managing them.

The product also supports PKCS#11 interfaces to hardware security modules (HSMs) for secure storage of private keys.

Interface to Identity and Access Management

SSH key management is part of identity and access management. Most customers want to integrate SSH One into their workflows for identity and access provisioning and deprovisioning. SSH One provides REST APIs to help do that.

Many of our customers integrate with, for example, Oracle Identity Manager.

Interface to Configuration Management Databases

Most customers already have a lot of data in various databases describing installed systems and accounts, applications they are used for, responsible people, and various other aspects of this environment. A lot of this information is very useful for speeding up an SSH key management project. SSH One provides REST APIs for importing such infomation.

Many of our customers integrate with, e.g., BMC Atrium or ServiceNow.

Interface to SIEM

SSH One has a two-way integration with security incident and event management (SIEM) systems. On one had, SSH One reads log information from hosts and can import it from a SIEM. The log information is very helpful in, for example, determining which SSH keys are actually being used and how they are used.

On the other hand, various components of SSH One generate their own log data and alerts. These can be sent to a SIEM using the syslog protocol. Alerts can also be triggered in several other ways.

Many of our customers integrate with, for example, Splunk, QRadar, or Arcsight.

Privilege Escalation

The Universal SSH Key Manager component also needs to escalate privileges to execute certain operations with privileged access when it is run without full root privileges.

We have customers using it with, for example, Powerbroker, Dell/Quest/Vintela, Centrify, or sudo. In most cases, these are supported out-of-the box, with minimal configuration.

Data Loss Prevention and Anti-Virus

The CryptoAuditor component is often used together with data loss prevention (DLP) solutions to gain leakage protection for encrypted file transfers. The ICAP protocol is used for integration with these systems. It is supported by most DLP and anti-virus vendors.

Two-Factor Authentication

The CryptoAuditor component can also be used for adding a second factor of authentication at a firewall or boundary, without having to add agents or other software on servers behind the firewall. It can use, e.g., the RADIUS protocol to talk to the two-factor authentication server. This is supported by most two-factor authentication solutions. Various other protocols are also available.

PKCS#11 Integration

The platform also supports PKCS#11 for interfacing with smartcard readers and hardware security modules (HSM).

Many customers use SSH One with, for example, Safenet Luna and readers for PIV/CAC cards as well as various national identity cards. We also support the DoD PKI.


What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now