Online SSH Certificate Authority
 
 
 
Go to file
Dustin be40c05b56
dustin/sshca/pipeline/head There was a failure building this commit Details
server/user: Add sign cert operation
The *POST /user/sign* operation issues SSH user certificates for the
public keys provided.  The request must include a valid OpenID Connect
Identity token in the `Authorization` request header, which will be used
to populate the valid principals in the signed certificate.

User certificates are typically issued for a very short duration (one
hour by default).  This precludes the need for revoking certificates
that are no longer trusted; users must reauthenticate frequently and
obtain a new certificate.
2023-11-21 22:03:02 -06:00
ci ci: Import ci pipeline from original repo 2023-11-13 20:11:49 -06:00
examples examples: Add took to generate a JWT for testing 2023-11-04 16:37:19 -05:00
src server/user: Add sign cert operation 2023-11-21 22:03:02 -06:00
tests server: user: Implement OIDC auth for users 2023-11-21 22:03:02 -06:00
.containerignore server: Add Containerfile 2023-11-08 21:29:00 -06:00
.editorconfig Initial commit 2023-11-04 16:36:20 -05:00
.gitattributes Initial commit 2023-11-04 16:36:20 -05:00
.gitignore Initial commit 2023-11-04 16:36:20 -05:00
Cargo.lock server: user: Implement OIDC auth for users 2023-11-21 22:03:02 -06:00
Cargo.toml server: user: Implement OIDC auth for users 2023-11-21 22:03:02 -06:00
Containerfile server: Add Containerfile 2023-11-08 21:29:00 -06:00
rustfmt.toml Initial commit 2023-11-04 16:36:20 -05:00