Get the latest tech news
SSH Keys Don't Scale. SSH Certificates Do
Breaking down the limitations of SSH key-based authentication and showing how SSH certificates enable modern, manageable infrastructure access.
In the best case, teams write runbooks, scripts, and adopt brittle tooling to streamline the process but, more often than not, it ends up evolving into significant operational overhead when onboarding or offboarding any users from the system. As mentioned, implementing an SSH certificate-based authentication scheme does require some upfront engineering effort, configuration for each user and host in the system, and understanding of underlying cryptographic primitives and concepts involved. Between running your own CAs, configuring users and hosts to trust them, managing principal permissions, and wiring all of it into your existing infrastructure; the setup for a scalable SSH solution can get complicated fast.
Or read this on Hacker News