SSH Certificate Authority Rocky Linux 8

preview_player
Показать описание
Create and use SSH Certificate Authority in Rocky Linux 8. In this video we are going to demonstrate how you can create a Certificate Authority (CA) in SSH to allow simplified trust relationships with the public keys of your estate servers. Rather than trust the public key of each server we can trust the CA public key and have the CA sign public keys of servers permitted to use that trust relationship. In that way client systems only need to trust the CA not every server on your estate. We use Rocky Linux 8 but any recent Linux distribution would work in the same way.

-~-~~-~~~-~~-~-
Please watch: "RHCSA 9 Working With Podman Containers"
-~-~~-~~~-~~-~-
Рекомендации по теме
Комментарии
Автор

Great tutorial n well explain demonstration.
Solve d problem of host verification (The authenticity of host can't be established) whether it is Passwordless/pubkey authentication(ca->server1, server2)
Or
Password authentication(client->server1, server2)
as the same private key of CA(cert-auth) sign the host rsa pub key of server1 n server2 n the public key of CA(cert-auth.pub) is specified in /etc/ssh/ssh-known-hosts of CA, client machine.

Sir Best video, keep it up

uttamkumarkumar
Автор

Vim has a built in auto-path completion (no plugins needed).
Ctrl-X Ctrl-F then Ctrl-P (prev) and Ctrl-N (next) to cycle through the options in the directory, and repeat Ctrl-X Ctrl-F to keep drilling down into the directory structure.
SUPER handy, it's a must know for using vim.

knight
Автор

Hi Andrew. Good to see you again. Chris from VMware.

Openwrt
Автор

Thanks... my colleagues would be watching this n finding very helpful...

kamakshyanayak
Автор

Good lessons, my appresiate, It would be very interesting to know about reverse process, access to multiply host via one adding your key only to this one.

ПавелНовиков-пь
Автор

are you planning on doing the other side of this with signed user keys??

kgchrome
Автор

Hello, I have successfully configured the SSH daemon setup with certificate-based authentication. Currently, is there a way to load the client's private key and certificate onto a YubiKey? If you have any specific sources, please share them with me for further research. Thank you!

thienlory
Автор

This concept confuses me, usually the client uses its private key to encrypt the connection and the server has the public key of the client in its authorized keys file, hence allows connection.

VipinKNarayanan
Автор

Can we do this signing CA with Ansible ?

vijaynirmal