Getting started with 1Password for your growing team, or refining your setup? Our Secured Success quickstart guide is for you.
Forum Discussion
rellek
2 years agoOccasional Contributor
Feature Request: SSH Agent improvements
Hi,
I was a little confused about the SSH Agent and the limit to 6 keys. So I submitted a support request #202069 which led me to here to lay out my ideas on how to vastly improve SSH workflows wi...
Michael_Mercuri
2 years agoFrequent Contributor
One trick which might help with running into the 6 key limit issue (which is not a 1Password limitation, but something that SSH servers enforce): you can add configuration to your ~/.ssh/config to specify the key to use for a given user and host. This means only the key specified will be used (if accepted), thus avoiding trying multiple keys and running into the limit.
I find it easiest to do this by storing the public keys in my ~/.ssh directory and reference those in my ~/.ssh/config file (e.g. ~/.ssh/id_ed25519.pub). This has the added benefit of security by not storing private key files on disk.
I then set options such as IdentitiesOnly yes
and IdentityFile ~/.ssh/id_ed25519.pub
in my host settings in ~/.ssh/config. This ensures that 1Password tries the private key corresponding to ~/.ssh/id_ed25519.pub first, and if successful, no other keys need to be attempted.