Online SSH Certificate Authority
 
 
 
Go to file
Dustin 748f4dba9a
dustin/sshca/pipeline/head This commit looks good Details
user: Allow adding principals by group membership
In some cases, users may need to authenticate as a different user on the
remote machine than their normal username. For example, the default user
*core* on a Fedora CoreOS machine, or the *root* user on machines that
have not been provisioned yet. In such cases, the default set of
principals on issued user certificates is not sufficient.

We don't want to allow users to specify arbitrary principals, so instead
we can use their membership in specific groups to add a preselected set
of principals.

Since the `groups` claim is not part of the core OpenID Connect
specification, we have to define it ourselves as part of the "additional
claims" of the token.  This is somewhat cumbersome and involves a lot of
copying from the core type aliases, but otherwise straightforward.
2024-02-02 20:00:32 -06:00
ci ci: Fix container image repo name 2024-01-31 20:56:15 -06:00
examples examples: Add took to generate a JWT for testing 2023-11-04 16:37:19 -05:00
src user: Allow adding principals by group membership 2024-02-02 20:00:32 -06:00
tests server: user: Implement OIDC auth for users 2023-11-21 22:03:02 -06:00
.containerignore server: Add Containerfile 2023-11-08 21:29:00 -06:00
.editorconfig Initial commit 2023-11-04 16:36:20 -05:00
.gitattributes Initial commit 2023-11-04 16:36:20 -05:00
.gitignore Initial commit 2023-11-04 16:36:20 -05:00
Cargo.lock server: user: Implement OIDC auth for users 2023-11-21 22:03:02 -06:00
Cargo.toml server: user: Implement OIDC auth for users 2023-11-21 22:03:02 -06:00
Containerfile container: Install openssl-devel in build stage 2024-01-31 20:35:40 -06:00
rustfmt.toml Initial commit 2023-11-04 16:36:20 -05:00