To be completely honest, the 'best practice' is DO NOT DO THIS... So that's the "best practice"... With that out of the way, the next answer is "store secrets however you deem it acceptable to store secrets". Identity files contain private keys and must be treated as confidential secrets. Backing them up really isn't recommended.
With all that out of the way, it sounds like you're running into a different problem. The way you describe it, I believe you have some machine somewhere that is not accessible in any way shape or form OTHER than by using OpenZiti. Is that correct, and you're trying to test a disaster recovery type of scenario?
I'm confused as to why you'd be using ssh or scp at all if port 22 was totally blocked so I feel like there's a piece of this puzzle that's missing or I'm not understanding
@qrkourier (or someone with a bit more linux foo than I have) would be great to have comment.
You could grant that user that is ssh'ing access to that path. That'd be what I would do. Let the user ssh'ing access the file using group/user permissions
Yes, suppose you installed the ziti-edge-tunnel package in Linux, and have a POSIX group named “ziti” that can access the agent socket and identity files, and you are logging in with SSH as user named “bob”.
You must add “bob” to group “ziti” and re-login.
sudo usermod -aG ziti bob
Re-login with SSH
Alternatively, you can run sudo interactively so you can type a password via SSH if, when you run ssh , add the ssh -t flag to provision an interactive session.