Via a single sign-on, Akeyless Vault connects an ssh client to the server, using your chosen Authentication Method (or through your Identity Provider) while using existing Access Groups and Policies in your environment.
Instead of issuing an SSH key pair - public and private, Akeyless provides ephemeral SSH certificates to allow access over standard SSH protocol, while eliminating the need for public SSH keys on the server side.
Akeyless SSH Certificate issuer allows eliminating key approval and distribution of keys in static files of Hosts and Clients.
You can define several SSH CA's (certificate authority), each one can sign your SSH public keys, with ancillary data like expiration date, principals, extensions, etc.
You can sign the certificate with your own private key, or generate new one in Akeyless Vault.
Prior to creating SSH cert. issuer you should upload your CA (RSA private key) for signing the client SSH certificate:
akeyless upload-rsa --name your-RSA-key-name --alg RSA2048 --rsa-key-file-path Path-to-RSA.pem
Alternatively, you can create a new RSA key in Akeyless Vault:
akeyless create-key --name your-RSA-key-name --alg RSA2048
In case you create a new private key, you should fetch the public key to use it on your host machine:
akeyless get-rsa-public --name your-RSA-key-name
- RAW: MIIBIjANBgkqhkiG9w0BAQEFAAOCOA89zd/GgaPmzisJ3PMqYy3cPvRJc7VWRu72wR9muOdHX3vP7bscR+fGgKuOn1XPXBPjsOmo - SSH: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQMpAMLn3TyairCPzfIqG4wUJFTWCemKV5Z0blvxzUuZnkWUHRdSnowxXyANqQcZ
Please copy only the SSH format (starting from “ssh-rsa…“) and copy it to a file on the SSH server, i.e. /etc/ssh/ca.pub
The following command will create a new SSH Cert Issuer in Akeyless Vault with ancillary data.
- signer-key-name: The private key to be used for certificate signing
- allowed-users: Users allowed to use the certificate (supports wildcard)
- principals: A specific set of SSH Certificate principals
- expiration-sec: Certificate time period until expiration
- extensions: A specific set of SSH Certificate extensions. Default extensions: permit-X11-forwarding, permit-agent-forwarding, permit-port-forwarding, permit-pty, permit-user-rc.
akeyless create-ssh-cert-issuer --name /prod/ssh-cert-issuer --signer-key-name /prod/prod-bastion --allowed-users 'ubuntu,root' --ttl 300
Akeyless Secure Remote Access
While working with Bastion make sure to set
session_*to ensure JIT users will be authorized for access.
The following figure depicts creation of a new SSH Cert. Issuer using the Web UI.
The following steps are performed by the user that wishes to authenticate to a remote server.
In order to sign your public key please use the following command:
akeyless get-ssh-certificate --cert-username ubuntu --cert-issuer-name /prod/ssh-cert-issuer --public-key-file-path ~/.ssh/id_rsa.pub
The command get-ssh-certificate returns a certificate that is signed by the private CA key and uses the client’s public key that will used to connect to the target server. The client public key is not the same as the CA’s public key. It is a local public key which should be located in the command’s path together with the client’s private key. After you run the command, the signed certificate will be placed in the same path, so you will be able to connect to the target server using the client’s private/public keys which are located on the same path.
The outcome of this command will be creating a new file beside the public key, with adding a suffix to its name with -cert.pub (~/.ssh/id_rsa-cert.pub). This is a well known convention with the OpenSSH use is during authentication.
- cert-username: The username to sign in the SSH certificate
- cert-issuer-name: The name of the SSH certificate issuer to use for signing
- public-key-file-path: SSH public key file path for signing
To enable certificate authentication you should configure the target server to trust any certificates signed by your CA's public key.
1 - Fetch the CA's public key from your Akeyless account via the following command:
akeyless get-rsa-public --name
the output should be contains two sections, one in a row format and the other in SSH format.
2 - Copy the Public Key with the SSH format from step 1 (ssh-rsa AAAAB3NzaC1yc2EAAAA...) to a new file /etc/ssh/ca.pub on the server that will be accepting SSH connections.
Please note that the AuthorizedPrincipalsFile is optional.
If you choose to use it, it needs to matched with the principals listed in the SSH Cert Issuer you created.
3 - Add the lines below to /etc/ssh/sshd_config. Once done the sshd service may need to be restarted
TrustedUserCAKeys /etc/ssh/ca.pub AuthorizedPrincipalsFile /etc/ssh/principals
Updated 2 days ago