Online SSH Certificate Authority
 
 
 
Go to file
Dustin f9ebbbcce9
dustin/sshca/pipeline/head This commit looks good Details
ca/user: Add certificate extensions
According to the *sshd(8)* manual page:

> Certificates may encode access restrictions similar to these key
> options.  If both certificate restrictions and key options are
> present, the most restrictive union of the two is applied.

This would seem to apply that if a certificate has no restrictions, all
features are allowed unless restricted in the `authorized_keys` file.
Unfortunately, this is not actually the case.  A certificate with no
extensions apparently trumps all other configuration.  As such,
certificates need to explicitly list the features users will need.

The list of extensions to add to user certificates is configurable via
the `ca.user.extensions` array.  The default set should provide a good
user experience without being overly permissive.
2024-02-01 09:05:04 -06:00
ci ci: Fix container image repo name 2024-01-31 20:56:15 -06:00
examples examples: Add took to generate a JWT for testing 2023-11-04 16:37:19 -05:00
src ca/user: Add certificate extensions 2024-02-01 09:05:04 -06:00
tests server: user: Implement OIDC auth for users 2023-11-21 22:03:02 -06:00
.containerignore server: Add Containerfile 2023-11-08 21:29:00 -06:00
.editorconfig Initial commit 2023-11-04 16:36:20 -05:00
.gitattributes Initial commit 2023-11-04 16:36:20 -05:00
.gitignore Initial commit 2023-11-04 16:36:20 -05:00
Cargo.lock server: user: Implement OIDC auth for users 2023-11-21 22:03:02 -06:00
Cargo.toml server: user: Implement OIDC auth for users 2023-11-21 22:03:02 -06:00
Containerfile container: Install openssl-devel in build stage 2024-01-31 20:35:40 -06:00
rustfmt.toml Initial commit 2023-11-04 16:36:20 -05:00