Tags: shaoyouwang/ssh-cert-authority
Tags
Resolves cloudtools#2 "Support binding to localhost" Introduces user-configured listen address and defaults to a more secure listen address of `127.0.0.1:8080`.
Add ability to inject critical options into certs You may now specify CriticalOptions in sign_certd's config on a per-environment basis. This allows you to write a policy that says all certs against this environment will have exactly these critical options. You can ensure that certs always launch users into restricted shells or from a defined range of source IPs as supported by sshd.
Add tool for generating KMS-encrypted CA keys Previously you had to run ssh-keygen temporarily storing the output in a file before using this utility to encrypt the key. Now you can simply have this tool generate the key and send the private directly to KMS for encryption. This should be both simpler and more secure.
Be able to load KMS-encrypted keys This commit introduces KMS functionality. Given an encrypted private key for the cert authority the signing daemon will call out to KMS on startup to decrypt the key and load it into the ssh-agent. Docs were updated accordingly.
PreviousNext