Loading...

LISA17 - Managing SSH Access without Managing SSH Keys

1,432 views

Loading...

Loading...

Transcript

The interactive transcript could not be loaded.

Loading...

Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Published on Nov 15, 2017

Niall Sheridan, Intercom

Everyone uses SSH to manage their production infrastructure, but it's really difficult to do a good job of managing SSH keys. Many organisations don't know how many SSH keys have access to production systems or how protected those keys are. A trusted SSH private key can be years old, unprotected by passphrase, and shared among multiple people who may not even work for you.

With some tooling and configuration SSH keys can be replaced with limited-use ephemeral certificates, issued centrally and with better access controls and automatic key expiration, solving many of the shortcomings of using SSH keys.

This talk will cover:

Managing SSH keys: The bad parts
Replacing SSH keys with ephemeral certificates: how & why
Discussion of an implementation of a CA for SSH certificates
Call for participation, showing github source

View the full LISA17 program: https://www.usenix.org/lisa17/program

Loading...

When autoplay is enabled, a suggested video will automatically play next.

Up next


to add this to Watch Later

Add to

Loading playlists...