SSH Key Management System
Securely register and manage your SSH public keys for University of Kentucky high-performance computing resources.
About This System
The SSH Key Management System (Locksmith) allows authorized users to upload and manage their SSH public keys for access to HPC clusters and computing resources operated by the Center for Computational Sciences (CCS) at the University of Kentucky.
Authentication is handled through CILogon, a federated identity service. You will log in using your existing institutional credentials - no separate account is required.
Supported Identity Providers
- University of Kentucky (UKY) - All UKY-affiliated users must use this provider
- ACCESS-CI - Required for all ACCESS users accessing KyRIC resources
- Other Institutions - Any Identity Provider available through CILogon can be used
If your institution is not listed, you may register with ACCESS-CI Identity and use ACCESS as your provider.
What You Can Do
- Register - Create your account by logging in with your institutional credentials
- Upload SSH Key - Submit your SSH public key (ssh-rsa or ssh-ed25519)
- Manage Keys - View, replace, or delete your registered SSH public key
- Update Contact Info - Maintain your secondary email address
You will be redirected to CILogon to select your Identity Provider and enter your credentials.
Security and Privacy Notice
This is a University of Kentucky information system. By using this system, you acknowledge and agree to the following:
- This system is for authorized use only. Unauthorized access or use is prohibited and may be subject to criminal and civil penalties.
- Only upload your public SSH keys. Never share or upload private keys.
- Your personal information is handled in accordance with the University of Kentucky policies.
- For questions about data handling, refer to the UK IT Security Policies and Guidelines.
Need Help?
For assistance with SSH key generation, portal access, or account issues, create a support ticket through the HPC User Support Request portal.
For step-by-step instructions on generating SSH keys and using this system, refer to our documentation on the CCS Knowledge Base.