SSH certificates: the better SSH experience
https://jpmens.net/2026/04/03/ssh-certificates-the-better-ssh-experience/
edit: I have clarified some of the examples and have incorporated most of your feedback for which many thanks!
SSH certificates: the better SSH experience
https://jpmens.net/2026/04/03/ssh-certificates-the-better-ssh-experience/
edit: I have clarified some of the examples and have incorporated most of your feedback for which many thanks!
It occurs to me that we can deploy SSH host keys and their certificates to nodes using #Ansible as it has two existing modules we can use for the task.
https://jpmens.net/2026/04/07/deploying-ssh-host-keys-and-certificates-with-ansible/
@jpmens Thanks! This is neat for hosts that you *own*, e.g. where you have control of the CA and access to its private key which one needs for signing hosts/user keys.
The "traditional" known_hosts/authorized keys was made for multi-user systems where you want secure connections between systems where you do not have root privileges.
But nowadays, most usage falls into the first category, I assume. And a CA makes that easier.
Again, thanks for explaining the details.
@jpmens thank you for the write-up! This reminded me I had a todo item to start a "Call for WG Adoption" for the internet-draft that specifies the SSH certificate format! Now done :-) https://mailarchive.ietf.org/arch/msg/ssh/5WHJgASVjhX-ihyEx1Ats_1JaaY/
I wonder if any of your future posts will trigger todo items on my side haha
@job a thousand excuses, and I cannot even blame autocorrect (vi doesn’t have it here). Also embarassing because I well know you’re Job.
Fixed and pushing as we speak!
@job now running on macOS ;-)
I haven’t actually checked whether and how “original Bill Joy” this is: https://ex-vi.sourceforge.net
brb, have to wash my hands — I used sourceforge :-(
@jpmens I've read the man pages and write-ups like these before. Users (and many sysadmins) can just barely handle SSH keys as is.
I am having a hard time imagining a robust process around granting users access to remote systems and network devices with this.
Generating a user's private key on their behalf would be a huge legal liability under legislation like NIS2.
Have you done any successful deployments of CAs?