|Choose Your Plan||
|SSH Server Management|
|SSH Two Factor Authentication|
|Linux User & Group Management|
|Audit Logs History||1 Day||3 Months||6 Months||12 Months|
|Agent Refresh Period||5 min||90 sec||60 sec||60 sec|
All invoices are billed in GBP (£). Prices shown in US Dollars ($) are converted from GBP (£) and rounded up.
Exchange rate: £1.00 = $1.00
All our plans include
Get access to a ton of features out of the box
All packages include technical support via email ticket system.
All user accounts have access to our API's based on their role and permissions.
All packages have access to documentation.
Month to Month Contract
All of our packages are month to month pay as you grow, so you can cancel at any time without worry of lock-in.
All packages include access to the Audit Logs. Each package has different data retention periods suited to the use case.
Each package has included user accounts up to a certain maximum. If you need more user accounts then please choose then next highest package.
Linux Identity and SSH Key Management15 Reviews as of March 2023 Submit a review Source: G2.com, Inc.
“Keystash solved centralised key management and user management in our Linux environment.
We went with Keystash because we couldn’t find another solution with the same features and the benefit has been the easiest deployment of keys to new servers which saves us time!”
Leejay Tavares (CTO)
"I needed a central SSH key management solution with MFA and Keystash was easy to setup and well priced. I have had to use support, as a third party piece of software didn't like the MFA option.
Keystash support was excellent and they helped me to find a way to get it to work as I wanted it to. I no longer have to manage user access for each server, so I save time."
David Eaton (Infrastructure Manager)
frequently asked questions
Here are the answers to some of the most common questions we hear from our appreciated customers
What Operating Systems does Keystash support?
Keystash has been tested with Debian 9 & 10, Ubuntu 16, 18 & 20, CentOS 6,7 & 8 and Arch Linux distributions. Keystash will work with any Linux or BDS system that supports Authorised Keys file in the home directory and a "sudoers" folder.
Can I create a temporary user and SSH key?
Yes. When creating a User simply enable expiration and set the date and time for when the account will expire. This allows you to create accounts for contractors or even regular users who need one time access to a particular system.
What happens if I lose connectivity to Keystash?
The Keystash server agent copies SSH Keys to the local file system on your servers so that users can always login irrespective of whether you server can still communicate with Keystash in the cloud.
Do I need to install software on my servers?
Yes, the Keystash agent will need to be installed on all servers that you want to manage. But don't worry, there are no software dependencies needed to run the agent, just an SSH Server that users authorised key files in the users home directories.