KuppingerCole ranks SSH.COM as one of the Leaders in the PAM market, raising the company from Challenger to Leader..
Read in detail about PrivX rapid deployment, ID service sync and multi-cloud server auto-discovery.
Fujitsu's IDaaS solution uses PrivX to eliminate passwords and streamline privileged access in hybrid environments.
Fast, robust and compliant. Get a free 45-day trial of Tectia SSH Client/Server.
As we grow, we are looking for talented and motivated people help build security solutions for amazing organizations.
For example, using a certificate downloaded from pki.ssh.com, when the following command is given:
pki.ssh.com
$ ssh-certview -width 70 ca-certificate.cer
The following output is produced:
Certificate = SubjectName = <C=FI, O=SSH Communications Security Corp, CN=Secure Shell Test CA> IssuerName = <C=FI, O=SSH Communications Security Corp, CN=Secure Shell Test CA> SerialNumber= 34679408 SignatureAlgorithm = rsa-pkcs1-sha1 Certificate seems to be self-signed. * Signature verification success. Validity = NotBefore = 2003 Dec 3rd, 08:04:27 GMT NotAfter = 2005 Dec 2nd, 08:04:27 GMT PublicKeyInfo = PublicKey = Algorithm name (SSH) : if-modn{sign{rsa-pkcs1-md5}} Modulus n (1024 bits) : 9635680922805930263476549641957998756341022541202937865240553 9374740946079473767424224071470837728840839320521621518323377 3593102350415987252300817926769968881159896955490274368606664 0759644131690750532665266218696466060377799358036735475902257 6086098562919363963470926690162744258451983124575595926849551 903 Exponent e ( 17 bits) : 65537 Extensions = Available = authority key identifier, subject key identifier, key usage(critical), basic constraints(critical), authority information access KeyUsage = DigitalSignature KeyEncipherment KeyCertSign CRLSign [CRITICAL] BasicConstraints = PathLength = 0 cA = TRUE [CRITICAL] AuthorityKeyID = KeyID = eb:f0:4d:b5:b2:4c:be:47:35:53:a8:37:d2:8d:c8:b2:f1:19:71:79 SubjectKeyID = KeyId = eb:f0:4d:b5:b2:4c:be:47:35:53:a8:37:d2:8d:c8:b2:f1:19:71:79 AuthorityInfoAccess = AccessMethod = 1.3.6.1.5.5.7.48.1 AccessLocation = Following names detected = URI (uniform resource indicator) Viewing specific name types = URI = http://pki.ssh.com:8090/ocsp-1/ Fingerprints = MD5 = c7:af:e5:3d:f6:ea:ce:da:07:93:d0:06:8d:c0:0a:f8 SHA-1 = 27:d7:19:47:7c:08:3e:1a:27:4b:68:8e:18:83:e8:f9:23:e8:29:85
[Contents] [Index]
Copyright © 2010 SSH Communications Security Corp. This software is protected by international copyright laws. All rights reserved. Copyright Notice
Start your journey towards a just-in-time (JIT) model with zero standing privileges (ZSP). Read 'Remove Standing Privileges Through a Just-In-Time PAM Approach' by Gartner , courtesy of SSH.COM.
PrivX® Free replaces your in-house jump hosts and combines your AWS, GCP and Azure access into one multi-cloud solution.