Dustin C. Hatch 748f4dba9a
All checks were successful
dustin/sshca/pipeline/head This commit looks good
user: Allow adding principals by group membership
In some cases, users may need to authenticate as a different user on the
remote machine than their normal username. For example, the default user
*core* on a Fedora CoreOS machine, or the *root* user on machines that
have not been provisioned yet. In such cases, the default set of
principals on issued user certificates is not sufficient.

We don't want to allow users to specify arbitrary principals, so instead
we can use their membership in specific groups to add a preselected set
of principals.

Since the `groups` claim is not part of the core OpenID Connect
specification, we have to define it ourselves as part of the "additional
claims" of the token.  This is somewhat cumbersome and involves a lot of
copying from the core type aliases, but otherwise straightforward.
2024-02-02 20:00:32 -06:00
2024-01-31 20:56:15 -06:00
2023-11-08 21:29:00 -06:00
2023-11-04 16:36:20 -05:00
2023-11-04 16:36:20 -05:00
2023-11-04 16:36:20 -05:00
2023-11-04 16:36:20 -05:00
Description
Online SSH Certificate Authority
313 KiB
Languages
Rust 96.7%
Shell 2.2%
Dockerfile 1.1%