SSH-agent for Windows, macOS, Linux
SSH-agent remembers SSH Public Key authentication, which can be time-limited by the user. This avoids the user having to type the password for each SSH connection, especially relevant to using Git over SSH. Native Windows has SSH including SSH-agent, and separately WSL also can use SSH-agent. SSH-agent works well with Git over SSH.
To use SSH-agent, add SSH keys like:
ssh-add -t 30m ~/.ssh/mykey
- remember authentication for a period of time (here, 30 minutes)
Remove all SSH-agent keys from RAM (if desired):
List all SSH-agent keys loaded:
Note that if the SSH private key was manually deleted, access to the remote SSH server is lost until a new private key is placed on the remote server when an SSH key is removed from SSH-agent.
Each operating system has a distinct method of enabling SSH-agent.
SSH-agent can be enabled from PowerShell:
if status of Windows SSH-Agent in Powershell is “Running” then SSH-agent should be working.
For Linux, including Windows Subsystem for Linux:
Add to ~/.profile:
if [ -z "$(pgrep ssh-agent)" ]; then rm -rf /tmp/ssh-* eval $(ssh-agent -s) > /dev/null else export SSH_AGENT_PID=$(pgrep ssh-agent) export SSH_AUTH_SOCK=$(find /tmp/ssh-* -name agent.*) fi
On macOS, SSH-agent is enabled by default.
SSH agents can have vulnerabilities, as noted for Windows and Linux.
Related: Disable Gnome Keyring SSH Agent