-
Hi. I've just read your article about using ssh certificates. With ssh keys a user may access only the hosts that have his key added to the list of authorized keys (~/.ssh/authorized_keys) to some local account (and thus one needs not only to have a private key, but also to know correct login). The rest is restricted. But how does such a restriction work with ssh certificates? Wouldn't the server, basically, let in ANY user with a correct certificate signed by a server-trusted CA? As far as I understood, implementing RBAC with ssh certificates on an enterprise needs to be done on the upper level, like on an SSO server (or right on the CA in case of direct PAM authentication [on CA] method mentioned in the article), is that correct? |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 1 reply
-
Thanks @Drugoy for the question!
The role of the SSO server is just authentication, it's not an authorization server in this case, because authorization happens when the SSH connection is made. But, the SSO server can determine which principals are added to the SSH user certificate. Hope this helps. |
Beta Was this translation helpful? Give feedback.
Thanks @Drugoy for the question!
There's a couple answers to this.
The role of the SSO server is just authentication, it's not an authorization server in this case, because authorization happens when the SSH connection is made…