Is your feature request related to a problem? Please describe.
Currently, all SSH connections are authenticated by SSH key pairs, which effectively prevents password leaks when web service provider is hijacked. However, users might want to revoke some created key pair on remote hosts if it is deemed no longer used. While it is possible to manually remove saved keys on remote hosts by editing files under ~/.ssh, there is no GUI implemented to achieve this.
Describe the solution you'd like
Provide a "Key Pair Manager" which helps users manager key pairs. Also auto remove keypair from remote host when deleting a session.
Describe alternatives you've considered
Better documentations to educate users how to do it manually.
Additional context
Add any other context or screenshots about the feature request here.
Is your feature request related to a problem? Please describe. Currently, all SSH connections are authenticated by SSH key pairs, which effectively prevents password leaks when web service provider is hijacked. However, users might want to revoke some created key pair on remote hosts if it is deemed no longer used. While it is possible to manually remove saved keys on remote hosts by editing files under ~/.ssh, there is no GUI implemented to achieve this.
Describe the solution you'd like Provide a "Key Pair Manager" which helps users manager key pairs. Also auto remove keypair from remote host when deleting a session.
Describe alternatives you've considered Better documentations to educate users how to do it manually.
Additional context Add any other context or screenshots about the feature request here.