Top Rated Keystash Alternatives

The tool is easy and the best solution in these times as not many tools in the market are the least expensive and easy to use. This particular software helps in mitigating that. Easy to install and use and nothing complex in it. Review collected by and hosted on G2.com.
There aren't enough downsides in using this software as this is newly launched and might be able to gauge the disadvantages in the long run. May be if they can increase the number of hosts per month for a free user and the others a bit more it would be so useful. Review collected by and hosted on G2.com.
14 out of 15 Total Reviews for Keystash
I needed a central SSH key management solution with MFA and Keystash was easy to setup and well priced. I have had to use support, as a third party piece of software didn't like the MFA option. Keystash support was excellent and they helped me to find a way to get it to work as I wanted it to. Review collected by and hosted on G2.com.
Nothing really. SSO with M365 would be nice for me, but not essential. Otherwise, it does exactly what I need it to. Someone below said "Storing the keys online rather than a local database feels rather insecure". Keystash only stores public keys online, not your private key. Review collected by and hosted on G2.com.
Keystash helps facilitate management and increase security by transitioning to a cloud-based SSH key management system. It ensures compliance and reduces IT burden. Review collected by and hosted on G2.com.
It happens to lose connectivity to Keystash. We then need to copy the SSH keys into the local file system of our server so that users can still connect, whether our server can communicate with Keystash in the cloud or not. It's cumbersome sometimes... Review collected by and hosted on G2.com.

Keystash is very flexible simultaneously, making our Linux platform secure. Furthermore, it has MFA; we can use passwords whenever we want to switch and add multiple users here. Review collected by and hosted on G2.com.
It could give options to integrate with the identity management systems like Azure AD, Facebook etc. It is providing support right now only for Linux. It should start for Microsoft as well. Review collected by and hosted on G2.com.

A single point and centralized location to manage all the SSH keys with additional features including two factor authentication and access levels. Additional API access and audit logs that can be used for reviews. Review collected by and hosted on G2.com.
Storing the keys online rather than a local database feels rather insecure knowing there's potential vulnerabilities associated with external or insider attacks. Review collected by and hosted on G2.com.

Complete SSH Key Management
When users upload or create new SSH keys, Keystash will provide instructions to ensure the greatest strength keys. For contractors or instances where you need to grant access for a brief time, create temporary user accounts and keys. Review collected by and hosted on G2.com.
This is a new tool for our organization, so we still find its documentation. I felt documentation would be better so we could easily follow. Review collected by and hosted on G2.com.

It is highly beneficial to safeguard the organization by securing and automating the keys. The 2-factor authentication ensures the security is top-notch within the company. Review collected by and hosted on G2.com.
The system's slowness can be an issue, but it is something rarely faced in the company, and no significant issues as such have been caused while using the program. Review collected by and hosted on G2.com.
Ability to create secure strength keys quickly. Also, to assign to contractors when required. The ability to upload and create new SSH keys help guide users. Providing a time period for the SSH keys allows for safer security in lost or transferred over keys. Review collected by and hosted on G2.com.
Use of the Keystash features being integrated to more services and apps. For example in Dockers and other personal Linux OSs. Using it in raspberry pi would be helpful to secure a vault. Review collected by and hosted on G2.com.

Interface is very quick, fast and nice, easy to manage multiple keys and users. The algorithm used to generate keys is very secure. Review collected by and hosted on G2.com.
Similar kind of tools are available with better support, I think a guidebook should be provided with every new release. Review collected by and hosted on G2.com.
Helps with a centralised user and privilege mangement including the SSH key Management. The admin console is very easy to use and makes access mangement very smooth Review collected by and hosted on G2.com.
The onboarding process for technical to non technical user for creating the SSH keys is not user friendly and takes a lot of time and learning curve. The process is very confusing when starting. Review collected by and hosted on G2.com.
