Email our fast, friendly support if you have a question not covered here: [email protected].
With self-service key management console, instant setup, and one-line deployment, configuring new user accounts and managing temporary keys is easy and fast. No more wasted time!
To override this behavior, execute the following command on any server to have a user's account converted to a Userify account:
sudo usermod -c 'userify-converted' alice
If the equivalent 'alice' username does not exist in Userify, or if it is not granted access onto your server, that user account will be removed from the system (but can be restored by re-granting Alice access to the server.)
/opt/userify/uninstall.sh
Userify is AICPA SOC-2 Type 1 certified and has achieved PCI-DSS and HIPAA compliance, as well as the top score at the Netcraft Site Report and has successfully completed the AWS Well-Architected Review.
Our web applications are designed to be resistant to XSS, CSRF, injection, inclusion, and many other attacks, and offers multi-factor authentication (MFA/2FA) for user logins. The source code for the Userify shim is opened on Github so you can audit its operation yourself.
Userify encrypts all data at rest, including all data that we store in Redis and S3, with Curve 25519. We minimize the use of secret materials in general, and sanitize incoming data. Passwords are hashed with bcrypt, scrypt, or argon2. All data in motion is encrypted with SSH or signed TLS.
We are constantly looking for ways to further improve our security profile and further work with the security community. Please email [email protected] if you have further questions.
Sign up for an account, create your projects and invite your users, and paste a one-liner into your server console. Are you currently using Chef, CloudFormation, or other systems? Check out the built-in integrations for popular platforms, or contribute your own.
If you purchase Userify Enterprise or Userify Express, install in your datacenter or VPC in seconds with a single command and use your corporate firewall, iptables, or AWS Security Groups to lock it down to your corporate subnets or VPN.
With Userify AWS, you don't even have to install: just click and your server will be live in your VPC in seconds!
No private key is needed at all to log you in! Your private key is the other half of the public key and can stay safely stored on your laptop. If your laptop is lost or stolen, you can remove your public key from all of your servers in seconds and block your own login.
This is a core principle of Userify's operation: Userify minimizes the use of secret material like private keys.
There is no shared secret like a password or a private key. Your public key is enough to securely log you in to a server, but you can still freely share your public key or publish it on your website.
Rotating or updating your private key is much easier to deal with than ever before. Instantly rotate your keys without dealing with production pushes from configuration management or IT involvement. Just paste your new public key into Userify and it will be deployed in seconds.
Userify Cloud is our Cloud edition. It requires no installation or other fees and you can start using it instantly with no credit card needed.
Userify Express is our fast and easy-to-install edition with no built-in limits on users, keys, or projects. Userify Express contains all of the functionality in Userify Cloud, but you can confine it within your VPC or LAN and configure it with your own mail server and domain names (i.e., https://userify.example.com).
Userify Enterprise is our solution for large enterprises and provides powerful cascading integration with Active Directory or LDAP.
SSH Key Scanner Now your Server View screen shows any unmanaged SSH keys that you should probably have a look at.
Wipe Root Login Keys Sometimes you can't be too sure, and now you can just check the box to make sure that users can't log in with a root key. Note that this doesn't prevent logging in with passwords, though!
Takeover User Tired of ec2-user, ubuntu, and other leftover users? Just add them to your Takeover User list and the users will be removed from your instances in minutes.
Require MFA This policy feature allows your company administrator to require all users to enable MFA/2FA before they can log in to servers. Disabled by default, but enabled is recommended.
Start managing your users and SSH keys in seconds Try for free