How to keep private keys used by talosctl secure in hardware tokens like Yubikey, Nitrokey PRO2/3, other PKCS11 compatible dongle, etc.? #9311
a-prokopyev-resume
started this conversation in
General
Replies: 1 comment 1 reply
-
At the moment, there's no support for it (in It would be still of limited use probably, as the cluster admin should have cluster secrets which are more sensitive than a client talosconfig. So the only case I can see here is giving out access to Talos API to non-privileged users. Another angle to that is to use Omni which acts as an authentication proxy, and ties Talos/Kubernetes API access to some authentication provider (e.g. Google), so no long-lived secrets on the client machine. |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Hello,
Does anyone know how to use PKCS11 hardware crypto for mtls authentication in talosctl ?
It seems AI generates hallucination:
https://www.perplexity.ai/search/how-to-use-pkcs11-with-talosct-Pqv2QXiYR8yWOjOWqLPbUg
Google does not return anything about +talos +yubikey :(
May be it is possible to get PKCS11 working with PKI?
https://www.talos.dev/v1.7/talos-guides/howto/cert-management/
Beta Was this translation helpful? Give feedback.
All reactions