Is it technically possible to encrypt some sensitive data using available SSH public key, so that only the owner of private key could read them with the help of SSH agent?
Why?
No need to remember one more password.
No need to send the password to a person who needs to read the file.
That is an interesting idea It would mean as a team you would need to add a specific (team) key to your agent (and ensure this key is
suficiently protected) in order to execute the playbook.
So some way to test if the key is loaded before starting the playbook (or as part of the playbook) would be useful.
The initial idea was to have the same data encrypted by multiple keys, so
that any from the team can open it, and you don’t need to give everybody
some team key or team password - just add all public keys to the chain.
Of course this is possible only when the basic problem of reusing SSH
agent for decryption can be solved.
You can encrypt data using GPG keys for multiple recipients - each recipient can access the data using his/her GPG key. GPG keys can also be used to authorize SSH access via Monkeysphere Project. - http://web.monkeysphere.info/.
Good pointer. It seems like there is no way to reuse SSH agent to decrypt the vault.
I need to read more about how GPG handles this, and I am somewhat concerned about
security of Monkeysphere.