No Smallstep SSH videos yet. You could help us improve this page by suggesting one.
Based on our record, KeePass seems to be a lot more popular than Smallstep SSH. While we know about 207 links to KeePass, we've tracked only 1 mention of Smallstep SSH. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
Https://keepass.info and share the database file on a shared folder or sync it somehow. - Source: Hacker News / 8 months ago
And the best part is there are solutions already that do this: https://keepass.info/ Does it work on Android or iOS? - Source: Hacker News / over 1 year ago
The key difference here being that this is two way hashing so passwords can be decrypted. In reality, there are a lot of attack vectors like MITM, event logging or sometimes straight up storing data in plaintext. Through these hackers can generally get passwords of all users of these services. So, why don't people use local password managers? Just a txt file encrypted with "master password" should be pretty... - Source: Hacker News / over 1 year ago
When you're at a point where you're relying on a display name to make security-critical decisions, you've already lost. Character substitutions like ķeepass or ƙeepass or keypass are at least possible to spot if you know the name of the product, but not the full URL. But there are many ways to create lookalike domains that don't change the product name: https://keepass.org https://keepass.net https://keepass.info... - Source: Hacker News / over 1 year ago
> People love to hate on passwords but the reality is that for many circumstances (threat models) they are the best compromise. You can make them more than strong enough (take 32+ bytes out of /dev/random and encode however you like, nobody will ever brute force that in this universe) and various passwords managers solve the problem of re-use (never reuse a password). > And it comes with the benefit that you... - Source: Hacker News / over 1 year ago
Through a combination of the properties that are in an SSH certificate and configuration on the hosts, you'll be able to realize RBAC. If you're using the open source step-ca, this will require you to configure things yourself on the hosts. We also have an offering where this capability and management/auditing of the rules is hosted for you, which makes that specific part easier: https://smallstep.com/sso-ssh/. Source: almost 2 years ago
1Password - 1Password can create strong, unique passwords for you, remember them, and restore them, all directly in your web browser.
Keystash.io - Centralized Linux user and SSH key management software
bitwarden - Bitwarden is a free and open source password management solution for individuals, teams, and business organizations.
strongDM - Trust strongDM to manage an engineers access to everything
Lastpass - LastPass is an online password manager and form filler that makes web browsing easier and more secure.
OneLogin - On-demand SSO, directory integration, user provisioning and more