Dustin C. Hatch f83cea50e9 r/ssu-user-ca: Configure sshd TrustedUserCAKeys
The `TrustedUserCAKeys` setting for *sshd(8)* tells the server to accept
any certificates signed by keys listed in the specified file.
The authenticating username has to match one of the principals listed in
the certificate, of course.

This role is applied to all machines, via the `base.yml` playbook.
Certificates issued by the user CA managed by SSHCA will therefore be
trusted everywhere.  This brings us one step closer to eliminating the
dependency on Active Directory/Samba.
2024-02-01 18:46:40 -06:00
2023-10-28 16:07:56 -05:00
2024-01-19 20:52:48 -06:00
2020-02-22 16:28:06 -06:00
2018-04-08 12:20:03 -05:00
2018-08-19 14:17:48 -05:00
2018-03-27 20:44:43 -05:00
2018-07-01 15:19:20 -05:00
2018-10-07 21:42:18 -05:00
2024-01-09 18:18:34 -06:00
2023-11-13 17:45:21 -06:00
2022-08-10 21:55:54 -05:00
2020-08-29 14:22:17 -05:00
2018-04-08 10:11:43 -05:00
2024-01-25 20:22:00 -06:00
2024-01-27 20:09:34 -06:00
2024-01-19 20:50:03 -06:00
2018-08-12 10:14:25 -05:00
2018-08-12 10:14:25 -05:00
2018-08-12 10:14:25 -05:00
2018-08-12 10:14:25 -05:00
2023-05-09 21:37:46 -05:00
2024-01-19 20:50:03 -06:00
2018-03-27 20:44:43 -05:00
2018-08-13 20:25:22 -05:00
2023-10-27 17:57:20 -05:00
2019-09-19 19:51:45 -05:00
2022-08-11 21:40:19 -05:00
2021-10-10 16:09:15 -05:00
Description
Ansible configuration policy for the private network/home lab of Dustin C. Hatch
http://dustin.hatch.name/
7.7 MiB
Languages
Jinja 86.2%
Python 6.6%
Shell 4.6%
Groovy 2.6%