Skip to content

Support signing Git commits with Teleport-issued SSH user certificates #32093

Open

Description

What would you like Teleport to do?

Add support for signing Git commits using SSH certificates issued by Teleport's user CA (or alternatively, maybe use another internally-managed Teleport CA which can be rotated independently of others)

What problem does this solve?

GPG signatures are the current standard for signing commits, but distributing GPG trust can be hard without signing parties. Verifiably asserting that the author of a given commit was in possession of an SSH certificate issued by a trusted Teleport CA provides a better way to bootstrap this trust.

If a workaround exists, please include it.

This may be supported already, in which case this issue is related to testing the workflow end to end and creating documentation for users and cluster admins on how to do it reliably.

References

https://sayr.us/git/ssh-sign-ca
https://agwa.name/blog/post/ssh_signatures
git/git#1041

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Metadata

Assignees

No one assigned

    Labels

    c-naInternal Customer Referencedocumentationfeature-requestUsed for new features in Teleport, improvements to current should be #enhancementssshunlocks-potentialUnlocks previously undocumented product potentialux

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions