
SSH ID
Passkeys for SSH
Fetch all your public keys with just your
SSH ID handle.
Using Termius? Get here

Secure access, made simple
SSH ID provides strong protection without adding friction with key management.
Simple provisioning
Access your keys instantly from anywhere with just your SSH ID handle. Update ~/.ssh/authorized_keys on a server with a simple curl or share your keys with others by sending the same link.

Connect with one click
SSH ID automatically selects the right key available on your device, so you can connect with one click without manual setup and hassle.

Set up SSH ID in seconds
Why engineers and teams use SSH ID
System Admins
Keep access simple across both modern and legacy systems. SSH ID brings all your key types under one handle, so you can log in without worrying about which key a system expects.
Software Engineers
Provision keys without friction. Integrate SSH ID with Ansible, Puppet, or JumpCloud to deploy the correct keys across multiple systems simultaneously.
Contractors
Share access safely. Send clients the link to your SSH ID page so they can access your latest public keys.
Under the hood
It is based on the basic functionality of SSH and works without server-side installation, protected by Face ID, Touch ID, or Windows Hello.
Built on SSH standards
SSH ID is based on SSH and Linux standards. It uses the native ~/.ssh/authorized_keys files, so you don't need extra agents or daemons.
Private keys stay on your device
Private keys are generated securely on your device, cannot be exported, and are never synced to the Termius cloud. Only public keys sync to your servers, ensuring authentication is tied to your devices.
Multiple key types supported
SSH ID supports both modern and legacy key algorithms, ensuring compatibility across various environments. Connect with biometric ECDSA-SK keys, ED25519, ECDSA, as well as RSA for older systems.
Biometric authentication
SSH ID integrates with your device's built-in biometrics, letting you authenticate with Touch ID, Face ID, or Windows Hello. Even if your device is compromised, no one can access it without you.
Already using Termius?
Get SSH ID


