Your browser does not allow storing cookies. We recommend enabling them.

Identity Key

An identity key is a private key that is used in SSH for granting access to servers. They are a kind of SSH key, used for public key authentication.

In OpenSSH, new identity keys can be created using the ssh-keygen tool. The tool generates both a private key and a public key. The public key can then be installed as an authorized key on a server using the ssh-copy-id. Generally each SSH implementation comes with its own tools for generating and installing keys.

While technically similar keys as host keys, identity keys are used for authenticating users, whereas host keys are used for authenticating computers.

Where Are Identity Keys Located

The default location for identity keys on Unix/Linux systems is the .ssh directory in each user's home directory. Identity key names typically start with id_, but this does not need to be the case.

Configuring the Location of Identity Keys

With OpenSSH, the location of identity keys is configured using the IdentityFile configuration option in the OpenSSH client configuration files, usually /etc/ssh/ssh_config or .ssh/config in the user's home directory. However, the location of the per-user configuration file may vary depending on server-wide configuration.

Some organizations also use SSH versions with custom compiled-in locations for SSH keys. It is best to use proper SSH key management tools, such as the Universal SSH Key Manager to manage the keys and configure the locations. Each product uses its own configuration mechanism.




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now