---
description: Review of Keystash Software: system overview, features, price and cost information. Get free demos and compare to similar programs on Software Advice New Zealand.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Keystash | Reviews, Pricing & Demos - SoftwareAdvice NZ
---

Breadcrumb: [Home](/) > [Authentication Software](/directory/4311/authentication/software) > [Keystash](/software/366883/keystash)

# Keystash

Canonical: https://www.softwareadvice.co.nz/software/366883/keystash

> Keystash is a Linux user access and SSH key management solution.&#10;Creating and managing Linux user accounts, privileges and SSH keys is typically a manual task, however Keystash provides a centralized management system that can connect across your Linux environments, ensuring that only the right people have access to the necessary servers with the correct privileges. &#10;&#10;Keystash significantly increases IT security and automation in Linux environments and enables good IT policy and governance with clear workflows for access with complete audit logs. Enforce high security policy on your SSH Servers, including disabling password access and enforcing SSH Two Factor Authentication.&#10;&#10;Keystash brings visibility to your Linux environments and stops the sprawl of ad-hoc SSH Key creation by centralizing and guiding users during the key creation process.&#10;&#10;Achieve alignment and compliance with the top IT Security frameworks such as ISO27001, SOC2, PCI-DSS and HIPAA by leveling up your Linux security posture.&#10;&#10;It allows administrators to create and manage Linux user accounts and groups, create and manage user SSH Keys, control access and privileges across multiple Linux servers, enforce SSH Server security like SSH Two Factor Authentication, gain visibility of all actions across the platform with audit logs and history, keep a watchful eye on your Linux environment inventory with detailed information like location, IPs and OS details, and deploy the Keystash agent to your Linux servers quickly and easily using standard software repo's: YUM and APT-GET.
> 
> Verdict: Rated \*\*\*\* by 0 users. Top-rated for **Overall Quality**.

-----

## About the vendor

- **Company**: Keystash

## Commercial Context

- **Starting Price**: £25.00
- **Pricing model**: Other (Free version available)
- **Pricing Details**: Pay per server over the included bundle of servers&#10;£0/month - Includes 3 users and up to 10 servers. £1.10/server/month thereafter&#10;£25/month - Includes 10 users and up to 30 servers. £0.70/server/month thereafter&#10;£95/month - Includes 25 user and up to 125 servers. £0.60/server/month thereafter&#10;£179/month - Includes 200 user and up to 250 servers. £0.50/server/month thereafter
- **Target Audience**: 2–10, 11–50, 51–200, 201–500
- **Deployment & Platforms**: Cloud, SaaS, Web-based
- **Supported Languages**: English
- **Available Countries**: Australia, Austria, Canada, Denmark, Egypt, Finland, France, Germany, India, Ireland, Isle of Man, Italy, Jersey, Kenya, Latvia, Mexico, Netherlands, New Zealand, Nigeria, Philippines and 5 more

## Features

- API
- Access Control
- Access Controls/Permissions
- Access Management
- Activity Dashboard
- Audit Trail
- Authentication
- Credential Management
- Multi-Factor Authentication
- Policy Management
- Role-Based Permissions
- Two-Factor Authentication
- User Management

## Support Options

- Email/Help Desk
- FAQs/Forum

## Category

- [Authentication Software](https://www.softwareadvice.co.nz/directory/4311/authentication/software)

## Related Categories

- [Authentication Software](https://www.softwareadvice.co.nz/directory/4311/authentication/software)
- [Multi-Factor Authentication Software (MFA)](https://www.softwareadvice.co.nz/directory/4459/multi-factor-authentication/software)
- [Privileged Access Management Software](https://www.softwareadvice.co.nz/directory/4241/privileged-access-management/software)
- [Identity Management Software](https://www.softwareadvice.co.nz/directory/4549/identity-management/software)

## Alternatives

1. [ManageEngine AD360](https://www.softwareadvice.co.nz/software/370056/manageengine-ad360) — 4.6/5 (34 reviews)
2. [Okta](https://www.softwareadvice.co.nz/software/419181/okta) — 4.7/5 (937 reviews)
3. [Auth0](https://www.softwareadvice.co.nz/software/107607/auth0) — 4.7/5 (141 reviews)
4. [JumpCloud Directory Platform](https://www.softwareadvice.co.nz/software/180508/jumpcloud-directory-as-a-service) — 4.6/5 (267 reviews)
5. [Cisco Duo](https://www.softwareadvice.co.nz/software/430527/duo-security) — 4.7/5 (548 reviews)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.nz/software/366883/keystash)

## This page is available in the following languages

| Locale | URL |
| en | <https://www.softwareadvice.com/identity-management/keystash-profile/> |
| en-AU | <https://www.softwareadvice.com.au/software/366883/keystash> |
| en-GB | <https://www.softwareadvice.co.uk/software/366883/keystash> |
| en-IE | <https://www.softwareadvice.ie/software/366883/keystash> |
| en-NZ | <https://www.softwareadvice.co.nz/software/366883/keystash> |

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":null,"address":{"@type":"PostalAddress","addressLocality":null,"addressRegion":null,"postalCode":null,"streetAddress":null},"description":"Software Advice helps businesses in New Zealand find the best software. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.nz","url":"https://www.softwareadvice.co.nz/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@type":"Organization","@id":"https://www.softwareadvice.co.nz/#organization","parentOrganization":"G2.com, Inc.","sameAs":[]},{"name":"Keystash","description":"Keystash is a Linux user access and SSH key management solution.\nCreating and managing Linux user accounts, privileges and SSH keys is typically a manual task, however Keystash provides a centralized management system that can connect across your Linux environments, ensuring that only the right people have access to the necessary servers with the correct privileges. \n\nKeystash significantly increases IT security and automation in Linux environments and enables good IT policy and governance with clear workflows for access with complete audit logs. Enforce high security policy on your SSH Servers, including disabling password access and enforcing SSH Two Factor Authentication.\n\nKeystash brings visibility to your Linux environments and stops the sprawl of ad-hoc SSH Key creation by centralizing and guiding users during the key creation process.\n\nAchieve alignment and compliance with the top IT Security frameworks such as ISO27001, SOC2, PCI-DSS and HIPAA by leveling up your Linux security posture.\n\nIt allows administrators to create and manage Linux user accounts and groups, create and manage user SSH Keys, control access and privileges across multiple Linux servers, enforce SSH Server security like SSH Two Factor Authentication, gain visibility of all actions across the platform with audit logs and history, keep a watchful eye on your Linux environment inventory with detailed information like location, IPs and OS details, and deploy the Keystash agent to your Linux servers quickly and easily using standard software repo's: YUM and APT-GET.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductScreenshot/fdd1ca34-a81b-4a18-be15-f0c1b6ca120d.png","url":"https://www.softwareadvice.co.nz/software/366883/keystash","@type":"SoftwareApplication","@id":"https://www.softwareadvice.co.nz/software/366883/keystash#software","applicationCategory":"BusinessApplication","publisher":{"@id":"https://www.softwareadvice.co.nz/#organization"},"offers":{"price":"25","@type":"Offer","priceCurrency":"GBP"},"operatingSystem":"Cloud"},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Authentication Software","position":2,"item":"/directory/4311/authentication/software","@type":"ListItem"},{"name":"Keystash","position":3,"item":"/software/366883/keystash","@type":"ListItem"}],"@id":"https://www.softwareadvice.co.nz/software/366883/keystash#breadcrumblist"}]}
</script>
