Managing multiple SSH keys can seem overwhelming at first, especially if you’re working across various projects that require different keys for secure access. Without proper configuration, switching between keys can lead to frustrating errors. This guide provides a clear and practical approach to handling multiple SSH keys effectively, ensuring seamless workflows across repositories.

Why Manage Multiple SSH Keys?

Using multiple SSH keys is common for developers working on:

  • Personal projects.
  • Employer repositories.
  • Client repositories (freelance work).

Each organization might require a unique SSH key for security and access control, and managing these keys properly ensures smooth sailing between repositories.

Setting Up Multiple SSH Keys

1. Generate SSH Keys

Start by generating unique SSH keys for each account or client.

Generate a new SSH key for Client A

ssh-keygen -t ed25519 -C "client_a@example.com" -f ~/.ssh/id_client_a

Generate another key for Client B

ssh-keygen -t ed25519 -C "client_b@example.com" -f ~/.ssh/id_client_b
  • The C flag adds a comment for easy identification.
  • The f flag specifies the file name to avoid overwriting existing keys.

2. Add SSH Keys to the SSH Agent

Use the SSH agent to manage your keys:

# Start the SSH agent
eval $(ssh-agent -s)

# Add the keys
ssh-add ~/.ssh/id_client_a
ssh-add ~/.ssh/id_client_b

Example: Using an Added Key

Once you’ve added a key to the agent, you can test its usage with a specific repository or service. For example:

# Clone a repository using the key added for Client A
git clone git@client_a:username/repo.git

This command will use the id_client_a key for authentication, assuming the SSH config is properly set up.

If you need to ensure the correct key is being used for a specific host, run:

ssh -T git@client_a
# Output example: Hi client_a! You've successfully authenticated.

3. Configure the SSH Config File

The SSH config file (~/.ssh/config) allows you to map each SSH key to its corresponding host. Open or create this file:

vim ~/.ssh/config

Add entries for each host:

# Configuration for Client A
Host client_a
    HostName github.com
    User git
    IdentityFile ~/.ssh/id_client_a

# Configuration for Client B
Host client_b
    HostName github.com
    User git
    IdentityFile ~/.ssh/id_client_b

4. Test the Configuration

Verify that the keys are mapped correctly:

ssh -T git@client_a
ssh -T git@client_b

You should see a success message for each host:

Hi client_a! You've successfully authenticated.
Hi client_b! You've successfully authenticated.

Switching Between Keys in Git

Specify the appropriate SSH key for each repository using the SSH alias defined in your config file.

Cloning Repositories

When cloning a repository, use the alias:

git clone git@client_a:username/repo.git

Updating Remote URLs for Existing Repositories

If you’re adding an SSH key to an existing repository:

git remote set-url origin git@client_a:username/repo.git

To git pull from client_a, you need to ensure the remote URL in your Git repository is configured correctly to use the client_a SSH configuration. Follow these steps:

1. Verify Your Remote URL

Check the remote URL of your Git repository:

git remote -v

If it shows something like:

origin git@github.com:username/repository.git

Update the remote to explicitly use the client_a or client_b host alias.

2. Update Remote to Use one of the clients

Set the remote URL to use your SSH configuration, in this case for client_a:

git remote set-url origin git@client_a:username/repository.git

Replace username/repository.git with the actual repository path.

3. Pull Changes

Now you can pull changes from the repository:

git pull origin branch_name

Replace branch_name with the branch you want to pull (e.g., main).

Wrapping Up

Managing multiple SSH keys doesn’t have to be daunting. With the right setup and a solid understanding of common pitfalls, you’ll switch between repositories seamlessly and troubleshoot issues with confidence.