Blogged it down because not everybody knows this:

- On macOS, ssh(1) has a "UseKeychain" option, which is awesome.
- If your ssh connection gets rejected, it might be because your agent has more than the server's MaxAuthTries keys it's trying; use 'IdentitiesOnly' to avoid that
- You can put your ssh private keys into 1Password and use _its_ SSH agent -> biometric unlock of ssh keys

https://www.netmeister.org/blog/sshkeys-macos-op.html

@jschauma There’s also an option that someone linked to from lobste.rs last week to generate and store keys in the secure element processor. These are unlocked by biometrics and can’t be leaked even in the event of a kernel compromise.
Native Secure Enclaved backed ssh keys on MacOS

Native Secure Enclaved backed ssh keys on MacOS . GitHub Gist: instantly share code, notes, and snippets.

Gist
How do you manage SSH keys?

77 comments

Lobsters
@svaclav @david_chisnall Nice, thanks for sharing, I'll link to that.