Replies: 1 comment 3 replies
-
Have you looked into
There's a good write-up on the bottom half of this page about how it works and what you can do with it: https://cottonlinux.com/ssh-certificates/ There's also a post from Facebook/Meta engineering which details how they use a similar method: https://engineering.fb.com/2016/09/12/security/scalable-and-secure-access-with-ssh/ |
Beta Was this translation helpful? Give feedback.
3 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
It is not possible to define in the teleport, which users can access a host with OpenSSH.
Even if it is not possible to set the permissions via RBAC
There could be some way to limit that user X cannot access host Y.
Maybe some way to create aliases in Teleport.
ex:
alias_name=myserver-openssh
address=1.2.3.4
user=myuser
port=22
As soon as I ssh into host myserver-openssh, it automatically connects to host 1.2.3.4, and if I don't pass any user, it defaults to the user myuser.
With that, you could create "access roles", and which users can access.
Beta Was this translation helpful? Give feedback.
All reactions