Get the latest tech news

SSH Keys Don't Scale. SSH Certificates Do


Breaking down the limitations of SSH key-based authentication and showing how SSH certificates enable modern, manageable infrastructure access.

In the best case, teams write runbooks, scripts, and adopt brittle tooling to streamline the process but, more often than not, it ends up evolving into significant operational overhead when onboarding or offboarding any users from the system. As mentioned, implementing an SSH certificate-based authentication scheme does require some upfront engineering effort, configuration for each user and host in the system, and understanding of underlying cryptographic primitives and concepts involved. Between running your own CAs, configuring users and hosts to trust them, managing principal permissions, and wiring all of it into your existing infrastructure; the setup for a scalable SSH solution can get complicated fast.

Get the Android app

Or read this on Hacker News

Read more on:

Photo of SSH keys

SSH keys

Photo of ssh certificates

ssh certificates

Related news:

News photo

Show HN: Keypub.sh – OAuth for the terminal using SSH keys