Replies: 1 comment 3 replies
-
Have you looked into
There's a good write-up on the bottom half of this page about how it works and what you can do with it: https://cottonlinux.com/ssh-certificates/ There's also a post from Facebook/Meta engineering which details how they use a similar method: https://engineering.fb.com/2016/09/12/security/scalable-and-secure-access-with-ssh/ |
Beta Was this translation helpful? Give feedback.
3 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
It is not possible to define in the teleport, which users can access a host with OpenSSH.
Even if it is not possible to set the permissions via RBAC
There could be some way to limit that user X cannot access host Y.
Maybe some way to create aliases in Teleport.
ex:
alias_name=myserver-openssh
address=1.2.3.4
user=myuser
port=22
As soon as I ssh into host myserver-openssh, it automatically connects to host 1.2.3.4, and if I don't pass any user, it defaults to the user myuser.
With that, you could create "access roles", and which users can access.
Beta Was this translation helpful? Give feedback.
All reactions