AliceKeys
Q&A

Questions and Answers

AliceKeys Team
#security#SaaS#technology#MDX

❓ What is AliceKeys?

AliceKeys is a mobile-first, hardware-backed SSH key system. It replaces traditional SSH keys with a secure key stored in your phone’s secure enclave, ensuring that the key never leaves your device and can’t be copied.


❓ Is this like turning my phone into a YubiKey?

Kind of, but with a much better experience. A YubiKey is a physical hardware token—you have to carry it around and plug it in whenever you need to authenticate.

With AliceKeys, your phone is the key, so:

Example:

Instead of reaching for a YubiKey, plugging it in, and tapping it every time you SSH into a server, AliceKeys lets you authenticate instantly using just your phone.


❓ How does it work for SSH?


❓ What kind of authentication does AliceKeys use?

It uses FIDO2/WebAuthn standards and short-lived SSH keys.


❓ What happens if I lose my phone?

If you lose your phone, your key is still safe because:

  1. It’s stored in the secure enclave and can’t be extracted.
  2. You can revoke access for the lost keys.
  3. You must generate a new key from another trusted device and give that key access.

❓ Can it work offline?

Yes, AliceKeys has an offline mode, meaning you can authenticate without an internet connection. However, if needed for security audits, logs can sync later when back online.


❓ Is this open-source?

Not yet, but we’re planning to open-source core components soon. Stay tuned!


❓ Can this be used for enterprise teams?

Yes! We’re working on an enterprise version with:


❓ How does AliceKeys help with compliance?

AliceKeys ensures that all SSH keys are generated and stored in a secure enclave, backed by the mobile manufacturer’s attestation. This means:

Example:

Instead of manually tracking SSH key usage, you have guaranteed proof that only one key exists per device, reducing security risks.


❓ How does this make managing remote teams easier?

For global teams, managing hardware security tokens (like YubiKeys) is a logistical nightmare. You need to physically ship them, track them, and replace lost ones.

With AliceKeys:

Example:

A remote contractor in another country needs SSH access. Instead of mailing them a YubiKey, you remotely enroll their phone, ensuring secure access without delays.


❓ Does AliceKeys make compliance audits easier?

Yes! Since keys are bound to the user’s hardware, it eliminates common compliance headaches like:

Example:

During an audit, instead of searching through logs for old keys, you can simply prove that only verified devices hold valid keys—streamlining the compliance process.


❓ Will you support short-lived authentication in the future?

Yes, we’re planning to introduce temporary access approvals for high-security environments.

How it would work:

Example:

A developer needs to fix a production issue. Instead of giving them permanent SSH access, an admin grants a one-time authentication session—keeping security tight.


❓ Will AliceKeys have a self-hosted version?

Yes! We understand that some organizations need full control over their authentication systems, so we’re working on a self-hosted version that allows you to deploy AliceKeys on your own infrastructure.

Example:

If your company has strict data residency requirements, you can host AliceKeys internally and manage all SSH keys securely within your private network.


❓ Does AliceKeys support enterprise authentication systems like Keycloak or Azure AD?

Yes! AliceKeys is designed to integrate seamlessly with enterprise identity providers like:

Example:

If your company already uses Azure AD for authentication, AliceKeys can extend it to SSH, VPN, and Git signing, ensuring consistent security policies across all systems.


❓ Is AliceKeys ready for OAuth2/SAML integration?

Yes! AliceKeys is built with OAuth2 and SAML compatibility in mind, meaning it can:

Example:

A new employee joins your company, and instead of manually managing SSH keys, AliceKeys can automatically enroll them based on their SSO credentials (via Keycloak, Azure AD, or Okta).


❓ Can AliceKeys be used for Zero Trust security models?

Absolutely. AliceKeys fits perfectly into Zero Trust frameworks by ensuring:

Example:

Instead of trusting that a device is secure just because it’s inside a corporate network, AliceKeys enforces device-bound authentication, preventing lateral movement in case of a breach.


❓ Can AliceKeys be used for DevOps pipelines & CI/CD security?

Yes! AliceKeys can be used to secure CI/CD pipelines by enforcing cryptographic signing of:

Example:

If you want to guarantee that every Git commit in your repository is signed by an authorized developer using AliceKeys, you can enforce mandatory Git signing with SSH authentication.


❓ Can AliceKeys be extended to other authentication workflows?

Yes! The system is modular and extensible, meaning we can add more authentication use cases based on demand, such as:


❓ What other features are planned?

We’re exploring:


← Back to Blog