Replies: 2 comments 3 replies
-
|
Hi @hallvoren, step-ca supports different provisioners, most of them can be used for ssh certificates in hosts, see AWS, Azure and GCP uses instance identity documents provided by the cloud service to authenticate with the CA. JWK, X5C or K8sSA require a password or a token provided one time. JWK and X5C uses one time tokens, so they can only be used once. K8sSA token can be used multiple times. In all of them after an initial authentication, a cron or a systemd timer can be enabled to renew the certificate, the renewal of the certificate can use the SSHPOP provisioner that only requires the previous certificate to renew itself. As most of the provisioners, are based on tokens, you can also build a custom service that returns the appropriate token for each server, and authenticate them in a different way. @hallvoren Do you know if vSphere supports identity documents? If they do, can you create an issue and point us to the docs. |
Beta Was this translation helpful? Give feedback.
-
|
Hosts can obtain keys using several of the The default "JWK provisioner" that gets set up when you initialize If you don't want all of your hosts to have the password to decrypt the JWK private key, you can break this up into separate steps. You can have some trusted piece of infrastructure generate the token and pass it to the host to use. To generate a single-use token to obtain an SSH host certificate you'd run: To use the generated Hope this helps! |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi. I'm looking at using step ca for ssh, but your examples seems to be from AWS systems where you can use that to authenticate the hosts. Does anyone have any example on how to automatically and securely create and renew host keys for other hosts? Putting the password in scripts everywhere seems like a bad idea. For us most things run on vSphere.
Beta Was this translation helpful? Give feedback.
All reactions