Thanks to visit codestin.com
Credit goes to sshid.io

SSH.id

by

SSH.id

by

SSH.id

Passkeys for SSH

Fetch all your public keys with just your
SSH.id handle.

admin-devops-team

alex@admin-laptop:~$

admin-devops-team

alex@admin-laptop:~$

curl https://sshid.io/alex

#Macbook Pro
ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFHwmj3ggITWZxecxu9zrbNuZJCRXOGF3NxQWSnc/DicxlXS7kbW/4qvSFocaF+RuD+wQu90uMt4AEfCDZoIwQM=


#iPhone 17 Pro
ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFHwmj3ggITWZxecxu9zrbNuZJCRXOGF3NxQWSnc/DicxlXS7kbW/4qvSFocaF+RuD+wQu90uMt4AEfCDZoIwQM=

#HP Elite Book 840
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDA5YCyXGFdUVAuEgSSbdx0c6ZJlRwRFThfsmzyve0ku

alex@admin-laptop:~$

admin-devops-team

alex@admin-laptop:~$

curl https://sshid.io/alex

#Macbook Pro
ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFHwmj3ggITWZxecxu9zrbNuZJCRXOGF3NxQWSnc/DicxlXS7kbW/4qvSFocaF+RuD+wQu90uMt4AEfCDZoIwQM=


#iPhone 17 Pro
ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFHwmj3ggITWZxecxu9zrbNuZJCRXOGF3NxQWSnc/DicxlXS7kbW/4qvSFocaF+RuD+wQu90uMt4AEfCDZoIwQM=

#HP Elite Book 840
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDA5YCyXGFdUVAuEgSSbdx0c6ZJlRwRFThfsmzyve0ku

alex@admin-laptop:~$

admin-devops-team

alex@admin-laptop:~$

curl https://sshid.io/alex

#Macbook Pro
ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFHwmj3ggITWZxecxu9zrbNuZJCRXOGF3NxQWSnc/DicxlXS7kbW/4qvSFocaF+RuD+wQu90uMt4AEfCDZoIwQM=


#iPhone 17 Pro
ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFHwmj3ggITWZxecxu9zrbNuZJCRXOGF3NxQWSnc/DicxlXS7kbW/4qvSFocaF+RuD+wQu90uMt4AEfCDZoIwQM=

#HP Elite Book 840
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDA5YCyXGFdUVAuEgSSbdx0c6ZJlRwRFThfsmzyve0ku

alex@admin-laptop:~$

Secure access, made simple

SSH.id provides strong protection without adding friction with key management.

Secure access, made simple

SSH.id provides strong protection without adding friction with key management.

Secure access, made simple

SSH.id provides strong protection without adding friction with key management.

Secure access, made simple

SSH.id provides strong protection without adding friction with key management.

Simple provisioning

Access your keys instantly from anywhere with just your SSH.id handle. Update ~/.ssh/authorized_keys on a server with a simple curl or share your keys with others by sending the same link.

Connect with one click

SSH.id automatically selects the right key available on your device, so you can connect with one click without manual setup and hassle.

Set up SSH.id in seconds

Set up SSH.id in seconds

Set up SSH.id in seconds

Set up SSH.id in seconds

Install Termius

Get unique, device-bound passkeys on each of your devices.

1

Get Termius

Download Termius to all your devices.

2

Set up SSH.id

Open SSH.id in Settings.
Follow the guided steps.

3

Add to authorized keys

Copy the public keys to your
~/.ssh/authorized_keys file
with a simple command.

4

Connect in one click

Connect seamlessly using
SSH.id passkeys.

Install Termius

Get unique, device-bound passkeys on each of your devices.

1

Get Termius

Download Termius to all your devices.

2

Set up SSH.id

Open SSH.id in Settings.
Follow the guided steps.

3

Add to authorized keys

Copy the public keys to your
~/.ssh/authorized_keys file
with a simple command.

4

Connect in one click

Connect seamlessly using
SSH.id passkeys.

Install Termius

Get unique, device-bound passkeys on each of your devices.

1

Get Termius

Download Termius to all your devices.

2

Set up SSH.id

Open SSH.id in Settings.
Follow the guided steps.

3

Add to authorized keys

Copy the public keys to your
~/.ssh/authorized_keys file
with a simple command.

4

Connect in one click

Connect seamlessly using
SSH.id passkeys.

Install Termius

Get unique, device-bound passkeys on each of your devices.

1

Get Termius

Download Termius to all your devices.

2

Set up SSH.id

Open SSH.id in Settings.
Follow the guided steps.

3

Add to authorized keys

Copy the public keys to your
~/.ssh/authorized_keys file
with a simple command.

4

Connect in one click

Connect seamlessly using
SSH.id passkeys.

Why engineers and teams use SSH.id

Why engineers and teams use SSH.id

Why engineers and teams use SSH.id

Why engineers and teams use SSH.id

System Admins

Keep access simple across both modern and legacy systems. SSH.id brings all your key types under one handle, so you can log in without worrying about which key a system expects.

System Admins

Keep access simple across both modern and legacy systems. SSH.id brings all your key types under one handle, so you can log in without worrying about which key a system expects.

System Admins

Keep access simple across both modern and legacy systems. SSH.id brings all your key types under one handle, so you can log in without worrying about which key a system expects.

System Admins

Keep access simple across both modern and legacy systems. SSH.id brings all your key types under one handle, so you can log in without worrying about which key a system expects.

Developers

Stop juggling key files and configs. SSH.id provides passwordless, device-bound logins that work seamlessly across projects, machines, and environments.

Developers

Stop juggling key files and configs. SSH.id gives you passwordless, device-bound logins that just work across projects, machines, and environments.

Developers

Stop juggling key files and configs. SSH.id gives you passwordless, device-bound logins that just work across projects, machines, and environments.

Developers

Stop juggling key files and configs. SSH.id gives you passwordless, device-bound logins that just work across projects, machines, and environments.

Software Engineers

Provision keys without friction. Integrate SSH.id with Ansible, Puppet, or JumpCloud to deploy the correct keys across multiple systems simultaneously.

Software Engineers

Provision keys without friction. Integrate SSH.id with Ansible, Puppet, or JumpCloud to deploy the correct keys across multiple systems simultaneously.

Software Engineers

Provision keys without friction. Integrate SSH.id with Ansible, Puppet, or JumpCloud to deploy the correct keys across multiple systems simultaneously.

Software Engineers

Provision keys without friction. Integrate SSH.id with Ansible, Puppet, or JumpCloud to deploy the correct keys across multiple systems simultaneously.

Contractors

Share access safely. Send clients the link to your SSH.id page to provide them with your latest public keys.

Contractors

Share access safely. Send clients the link to your SSH.id page to provide them with your latest public keys.

Contractors

Share access safely. Send clients the link to your SSH.id page to provide them with your latest public keys.

Contractors

Share access safely. Send clients the link to your SSH.id page to provide them with your latest public keys.

Under the hood

It is based on the basic functionality of SSH and works without server-side installation, protected by Face ID, Touch ID, or Windows Hello.

Under the hood

It is based on the basic functionality of SSH and works without server-side installation, protected by Face ID, Touch ID, or Windows Hello.

Under the hood

It is based on the basic functionality of SSH and works without server-side installation, protected by Face ID, Touch ID, or Windows Hello.

Under the hood

It is based on the basic functionality of SSH and works without server-side installation, protected by Face ID, Touch ID, or Windows Hello.

Built on SSH standards

SSH.id is based on SSH and Linux standards. It uses the native ~/.ssh/authorized_keys files, so you don't need extra agents or daemons.

Private keys stay on your device

Private keys are generated securely on your device, cannot be exported, and are never synced to the Termius cloud. Only public keys sync to your servers, ensuring authentication is tied to your devices.

Multiple key types supported

SSH.id supports both modern and legacy key algorithms, ensuring compatibility across various environments. Connect with biometric ECDSA-SK keys, ED25519, ECDSA, as well as RSA for older systems.

Biometric authentication

SSH.id integrates with your device's built-in biometrics, letting you authenticate with Touch ID, Face ID, or Windows Hello. Even if your device is compromised, no one can access it without you.

Get started with SSH.id passkeys

Experience passwordless access from any device

Get started with SSH.id passkeys

Experience passwordless access from any device

Get started with SSH.id passkeys

Experience passwordless access from any device

Get started with SSH.id passkeys

Experience passwordless access from any device

Frequently Asked Questions

Frequently Asked Questions

Frequently Asked Questions

Frequently Asked Questions

Where did these keys come from?

Why are those keys accessible online?

Why should I trust these keys?

What is the safest option?

Why do I need a Termius account to use SSH.id?

Where did these keys come from?

Why are those keys accessible online?

Why should I trust these keys?

What is the safest option?

Why do I need a Termius account to use SSH.id?

Where did these keys come from?

Why are those keys accessible online?

Why should I trust these keys?

What is the safest option?

Why do I need a Termius account to use SSH.id?

Where did these keys come from?

Why are those keys accessible online?

Why should I trust these keys?

What is the safest option?

Why do I need a Termius account to use SSH.id?

SSH.id

Passkeys for SSH

SSH.id is a simple, secure way to connect with unextractable device-bound keys. Built and maintained by Termius.

Ⓒ 2026 Termius Corporation. All rights reserved

SSH.id

Passkeys for SSH

SSH.id is a simple, secure way to connect with unextractable device-bound keys. Built and maintained by Termius.

Ⓒ 2026 Termius Corporation. All rights reserved

SSH.id

Passkeys for SSH

SSH.id is a simple, secure way to connect with unextractable device-bound keys. Built and maintained by Termius.

Ⓒ 2026 Termius Corporation. All rights reserved

SSH.id

Passkeys for SSH

SSH.id is a simple, secure way to connect with unextractable device-bound keys. Built and maintained by Termius.

Ⓒ 2026 Termius Corporation. All rights reserved