# SSH Authorized Keys

## Overview

**Evidence:** SSH Authorized Keys\
**Description:** Collect SSH authorized keys\
**Category:** Network\
**Platform:** macos\
**Short Name:** sshauth\
**Is Parsed:** Yes\
**Sent to Investigation Hub:** Yes\
**Collect File(s):** No

## Background

SSH authorized keys contain public keys that are allowed to authenticate to user accounts without passwords. This data is essential for understanding SSH key-based authentication, detecting unauthorized access, and investigating SSH-related security incidents.

## Data Collected

This collector gathers structured data about ssh authorized keys.

## Collection Method

This collector parses the necessary data from SSH authorized keys files.

## Forensic Value

This evidence is crucial for forensic investigations as it provides information about SSH key-based authentication. It helps investigators understand SSH access patterns, detect unauthorized keys, and investigate SSH-related attacks. The data can reveal key-based access, authentication methods, and potential security vulnerabilities.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://kb.binalyze.com/air/features/acquisition/acquisition-profiles/macos-collections/ssh-authorized-keys.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
