SlideShare a Scribd company logo
1 of 27
Managing SSH Access
Without Managing SSH Keys
Niall Sheridan
niall@intercom.com 

Intercom Production Systems
- NIST IR 7966 Security of Interactive and Automated Access Management Using Secure Shell (SSH)
"Many organizations don't even know how
many SSH keys they have configured to
grant access to their information
systems or who has copies of those keys"
Bastion

SSH key + 2FA
App Instances
SSH Certificates
•Composed of: ssh key + signature +
signing key + metadata
•Only need to distribute 1 public key to
machines - the signing key
•Metadata allows for some nice properties
to be set
Type: ssh-ed25519-cert-v01@openssh.com user certificate
Public key: ED25519-CERT SHA256:WHATEVER
Signing CA: ED25519 SHA256:WHATEVER
Key ID: "some identity string"
Serial: 0
Valid: from 2017-08-23T22:40:40 to 2017-08-24T22:45:36
Principals:
niall
Critical Options:
force-command /bin/date
source-address 12.34.56.78/29
Extensions:
permit-pty
permit-port-forwarding
permit-x11-forwarding
Type: ssh-ed25519-cert-v01@openssh.com user certificate
Public key: ED25519-CERT SHA256:WHATEVER
Signing CA: ED25519 SHA256:WHATEVER
Key ID: "some identity string"
Serial: 0
Valid: from 2017-08-23T22:40:40 to 2017-08-24T22:45:36
Principals:
niall
Critical Options:
force-command /bin/date
source-address 12.34.56.78/29
Extensions:
permit-pty
permit-port-forwarding
permit-x11-forwarding
Certificate Type
Type: ssh-ed25519-cert-v01@openssh.com user certificate
Public key: ED25519-CERT SHA256:WHATEVER
Signing CA: ED25519 SHA256:WHATEVER
Key ID: "some identity string"
Serial: 0
Valid: from 2017-08-23T22:40:40 to 2017-08-24T22:45:36
Principals:
niall
Critical Options:
force-command /bin/date
source-address 12.34.56.78/29
Extensions:
permit-pty
permit-port-forwarding
permit-x11-forwarding
Key ID
Type: ssh-ed25519-cert-v01@openssh.com user certificate
Public key: ED25519-CERT SHA256:WHATEVER
Signing CA: ED25519 SHA256:WHATEVER
Key ID: "some identity string"
Serial: 0
Valid: from 2017-08-23T22:40:40 to 2017-08-24T22:45:36
Principals:
niall
Critical Options:
force-command /bin/date
source-address 12.34.56.78/29
Extensions:
permit-pty
permit-port-forwarding
permit-x11-forwarding
Certificate Lifetime
Type: ssh-ed25519-cert-v01@openssh.com user certificate
Public key: ED25519-CERT SHA256:WHATEVER
Signing CA: ED25519 SHA256:WHATEVER
Key ID: "some identity string"
Serial: 0
Valid: from 2017-08-23T22:40:40 to 2017-08-24T22:45:36
Principals:
niall
Critical Options:
force-command /bin/date
source-address 12.34.56.78/29
Extensions:
permit-pty
permit-port-forwarding
permit-x11-forwarding
Username(s)
Type: ssh-ed25519-cert-v01@openssh.com user certificate
Public key: ED25519-CERT SHA256:WHATEVER
Signing CA: ED25519 SHA256:WHATEVER
Key ID: "some identity string"
Serial: 0
Valid: from 2017-08-23T22:40:40 to 2017-08-24T22:45:36
Principals:
niall
Critical Options:
force-command /bin/date
source-address 12.34.56.78/29
Extensions:
permit-pty
permit-port-forwarding
permit-x11-forwarding
Certificate Restrictions
/etc/ssh/sshd_config:

# Required:

TrustedUserCAKeys /etc/ssh/ca.pub

# Optional, useful for shared accounts

AuthorizedPrincipalsFile %h/.ssh/auth_users



$ cat /etc/ssh/ca.pub

ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDAYZL32Emt4Ap......

ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDGmvJaFt37ZTz......

ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDWmdffJK0YR8z......

ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOBL2PHBRyIa7ok......
SSH Key Authentication:

sshd[6382]: Accepted publickey for prod-user from
10.0.0.167 port 49562 ssh2: RSA bb:86:14:02:cf:
37:91:b9:4f:09:76:8f:e0:bc:52:77
SSH Certificate Authentication:

sshd[6382]: Accepted publickey for prod-user from
10.0.0.167 port 33984 ssh2: ED25519-CERT ID
niall_1503934975 (serial 0) CA ED25519 bd:0b:55:9f:
84:be:ad:e9:eb:ac:7e:8c:83:ed:4d:cb
Bastion

SSH cert + 2FA
App Instances
https://github.com/nsheridan/cashier
Thank you!
Niall Sheridan
niall@intercom.com

More Related Content

What's hot

SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
Ahmed Elnaggar
 
Hashitalks 2021 - How the Dynamic Duo of Vault and Puppet Tame SSL Certificates
Hashitalks 2021 - How the Dynamic Duo of Vault and Puppet Tame SSL CertificatesHashitalks 2021 - How the Dynamic Duo of Vault and Puppet Tame SSL Certificates
Hashitalks 2021 - How the Dynamic Duo of Vault and Puppet Tame SSL Certificates
Nick Maludy
 
Sniffing SSL Traffic
Sniffing SSL TrafficSniffing SSL Traffic
Sniffing SSL Traffic
dkaya
 
Ssh And Rlogin
Ssh And RloginSsh And Rlogin
Ssh And Rlogin
Sourav Roy
 
BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...
BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...
BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...
BlueHat Security Conference
 

What's hot (20)

SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
 
Hashitalks 2021 - How the Dynamic Duo of Vault and Puppet Tame SSL Certificates
Hashitalks 2021 - How the Dynamic Duo of Vault and Puppet Tame SSL CertificatesHashitalks 2021 - How the Dynamic Duo of Vault and Puppet Tame SSL Certificates
Hashitalks 2021 - How the Dynamic Duo of Vault and Puppet Tame SSL Certificates
 
Sniffing SSL Traffic
Sniffing SSL TrafficSniffing SSL Traffic
Sniffing SSL Traffic
 
TLS Interception considered harmful (Chaos Communication Camp 2015)
TLS Interception considered harmful (Chaos Communication Camp 2015)TLS Interception considered harmful (Chaos Communication Camp 2015)
TLS Interception considered harmful (Chaos Communication Camp 2015)
 
Ssh And Rlogin
Ssh And RloginSsh And Rlogin
Ssh And Rlogin
 
SSl/TLS Analysis
SSl/TLS AnalysisSSl/TLS Analysis
SSl/TLS Analysis
 
Types of ssl commands and keytool
Types of ssl commands and keytoolTypes of ssl commands and keytool
Types of ssl commands and keytool
 
Secure shell
Secure shellSecure shell
Secure shell
 
Ssh (The Secure Shell)
Ssh (The Secure Shell)Ssh (The Secure Shell)
Ssh (The Secure Shell)
 
Secure SHell
Secure SHellSecure SHell
Secure SHell
 
SSL/TLS
SSL/TLSSSL/TLS
SSL/TLS
 
SSH - Secure Shell
SSH - Secure ShellSSH - Secure Shell
SSH - Secure Shell
 
Secure shell protocol
Secure shell protocolSecure shell protocol
Secure shell protocol
 
SSL
SSLSSL
SSL
 
Secure Shell(ssh)
Secure Shell(ssh)Secure Shell(ssh)
Secure Shell(ssh)
 
BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...
BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...
BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...
 
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
SSL/TLS Introduction with Practical Examples Including Wireshark CapturesSSL/TLS Introduction with Practical Examples Including Wireshark Captures
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
 
SSL
SSLSSL
SSL
 
SSH.ppt
SSH.pptSSH.ppt
SSH.ppt
 
Ssl in a nutshell
Ssl in a nutshellSsl in a nutshell
Ssl in a nutshell
 

Similar to Managing SSH Acccess Without Managing SSH Keys

The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT security
Julien Vermillard
 
Addmi 14-discovery credentials
Addmi 14-discovery credentialsAddmi 14-discovery credentials
Addmi 14-discovery credentials
odanyboy
 
Configuring Secure Shell on Routers and Switches Running Cisco IO
Configuring Secure Shell on Routers and Switches Running Cisco IOConfiguring Secure Shell on Routers and Switches Running Cisco IO
Configuring Secure Shell on Routers and Switches Running Cisco IO
Hoàng Hải Nguyễn
 

Similar to Managing SSH Acccess Without Managing SSH Keys (20)

February 2016 Webinar Series - Best Practices for IoT Security in the Cloud
February 2016 Webinar Series - Best Practices for IoT Security in the CloudFebruary 2016 Webinar Series - Best Practices for IoT Security in the Cloud
February 2016 Webinar Series - Best Practices for IoT Security in the Cloud
 
Secure Credential Management with CredHub - Eoghan Kelleher
Secure Credential Management with CredHub - Eoghan KelleherSecure Credential Management with CredHub - Eoghan Kelleher
Secure Credential Management with CredHub - Eoghan Kelleher
 
Securing Your Resources with Short-Lived Certificates!
Securing Your Resources with Short-Lived Certificates!Securing Your Resources with Short-Lived Certificates!
Securing Your Resources with Short-Lived Certificates!
 
Best Practices of IoT Security in the Cloud
Best Practices of IoT Security in the CloudBest Practices of IoT Security in the Cloud
Best Practices of IoT Security in the Cloud
 
Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...
 
(MBL311) NEW! AWS IoT: Securely Building, Provisioning, & Using Things
(MBL311) NEW! AWS IoT: Securely Building, Provisioning, & Using Things(MBL311) NEW! AWS IoT: Securely Building, Provisioning, & Using Things
(MBL311) NEW! AWS IoT: Securely Building, Provisioning, & Using Things
 
Secure Credential Management with CredHub - DaShaun Carter & Sharath Sahadevan
Secure Credential Management with CredHub - DaShaun Carter & Sharath Sahadevan Secure Credential Management with CredHub - DaShaun Carter & Sharath Sahadevan
Secure Credential Management with CredHub - DaShaun Carter & Sharath Sahadevan
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT security
 
U2F/FIDO2 implementation of YubiKey
U2F/FIDO2 implementation of YubiKeyU2F/FIDO2 implementation of YubiKey
U2F/FIDO2 implementation of YubiKey
 
Addmi 14-discovery credentials
Addmi 14-discovery credentialsAddmi 14-discovery credentials
Addmi 14-discovery credentials
 
Securing Network Access with Open Source solutions
Securing Network Access with Open Source solutionsSecuring Network Access with Open Source solutions
Securing Network Access with Open Source solutions
 
Alternatives and Enhancements to CAs for a Secure Web
Alternatives and Enhancements to CAs for a Secure WebAlternatives and Enhancements to CAs for a Secure Web
Alternatives and Enhancements to CAs for a Secure Web
 
Keystone - Openstack Identity Service
Keystone - Openstack Identity Service Keystone - Openstack Identity Service
Keystone - Openstack Identity Service
 
Configuring Secure Shell on Routers and Switches Running Cisco IO
Configuring Secure Shell on Routers and Switches Running Cisco IOConfiguring Secure Shell on Routers and Switches Running Cisco IO
Configuring Secure Shell on Routers and Switches Running Cisco IO
 
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / DatelecSecure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
 
Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the CloudBest Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud
 
Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the CloudBest Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud
 
RSA SecurID Access
RSA SecurID AccessRSA SecurID Access
RSA SecurID Access
 
How to Bulletproof Your Scylla Deployment
How to Bulletproof Your Scylla DeploymentHow to Bulletproof Your Scylla Deployment
How to Bulletproof Your Scylla Deployment
 
How to increase security with SSH
How to increase security with SSHHow to increase security with SSH
How to increase security with SSH
 

Recently uploaded

The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 

Recently uploaded (20)

The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodology
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 

Managing SSH Acccess Without Managing SSH Keys

  • 1. Managing SSH Access Without Managing SSH Keys Niall Sheridan niall@intercom.com 
 Intercom Production Systems
  • 2. - NIST IR 7966 Security of Interactive and Automated Access Management Using Secure Shell (SSH) "Many organizations don't even know how many SSH keys they have configured to grant access to their information systems or who has copies of those keys"
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. Bastion
 SSH key + 2FA App Instances
  • 10.
  • 11.
  • 12. SSH Certificates •Composed of: ssh key + signature + signing key + metadata •Only need to distribute 1 public key to machines - the signing key •Metadata allows for some nice properties to be set
  • 13. Type: ssh-ed25519-cert-v01@openssh.com user certificate Public key: ED25519-CERT SHA256:WHATEVER Signing CA: ED25519 SHA256:WHATEVER Key ID: "some identity string" Serial: 0 Valid: from 2017-08-23T22:40:40 to 2017-08-24T22:45:36 Principals: niall Critical Options: force-command /bin/date source-address 12.34.56.78/29 Extensions: permit-pty permit-port-forwarding permit-x11-forwarding
  • 14. Type: ssh-ed25519-cert-v01@openssh.com user certificate Public key: ED25519-CERT SHA256:WHATEVER Signing CA: ED25519 SHA256:WHATEVER Key ID: "some identity string" Serial: 0 Valid: from 2017-08-23T22:40:40 to 2017-08-24T22:45:36 Principals: niall Critical Options: force-command /bin/date source-address 12.34.56.78/29 Extensions: permit-pty permit-port-forwarding permit-x11-forwarding Certificate Type
  • 15. Type: ssh-ed25519-cert-v01@openssh.com user certificate Public key: ED25519-CERT SHA256:WHATEVER Signing CA: ED25519 SHA256:WHATEVER Key ID: "some identity string" Serial: 0 Valid: from 2017-08-23T22:40:40 to 2017-08-24T22:45:36 Principals: niall Critical Options: force-command /bin/date source-address 12.34.56.78/29 Extensions: permit-pty permit-port-forwarding permit-x11-forwarding Key ID
  • 16. Type: ssh-ed25519-cert-v01@openssh.com user certificate Public key: ED25519-CERT SHA256:WHATEVER Signing CA: ED25519 SHA256:WHATEVER Key ID: "some identity string" Serial: 0 Valid: from 2017-08-23T22:40:40 to 2017-08-24T22:45:36 Principals: niall Critical Options: force-command /bin/date source-address 12.34.56.78/29 Extensions: permit-pty permit-port-forwarding permit-x11-forwarding Certificate Lifetime
  • 17. Type: ssh-ed25519-cert-v01@openssh.com user certificate Public key: ED25519-CERT SHA256:WHATEVER Signing CA: ED25519 SHA256:WHATEVER Key ID: "some identity string" Serial: 0 Valid: from 2017-08-23T22:40:40 to 2017-08-24T22:45:36 Principals: niall Critical Options: force-command /bin/date source-address 12.34.56.78/29 Extensions: permit-pty permit-port-forwarding permit-x11-forwarding Username(s)
  • 18. Type: ssh-ed25519-cert-v01@openssh.com user certificate Public key: ED25519-CERT SHA256:WHATEVER Signing CA: ED25519 SHA256:WHATEVER Key ID: "some identity string" Serial: 0 Valid: from 2017-08-23T22:40:40 to 2017-08-24T22:45:36 Principals: niall Critical Options: force-command /bin/date source-address 12.34.56.78/29 Extensions: permit-pty permit-port-forwarding permit-x11-forwarding Certificate Restrictions
  • 19. /etc/ssh/sshd_config:
 # Required:
 TrustedUserCAKeys /etc/ssh/ca.pub
 # Optional, useful for shared accounts
 AuthorizedPrincipalsFile %h/.ssh/auth_users
 
 $ cat /etc/ssh/ca.pub
 ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDAYZL32Emt4Ap......
 ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDGmvJaFt37ZTz......
 ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDWmdffJK0YR8z......
 ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOBL2PHBRyIa7ok......
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. SSH Key Authentication:
 sshd[6382]: Accepted publickey for prod-user from 10.0.0.167 port 49562 ssh2: RSA bb:86:14:02:cf: 37:91:b9:4f:09:76:8f:e0:bc:52:77 SSH Certificate Authentication:
 sshd[6382]: Accepted publickey for prod-user from 10.0.0.167 port 33984 ssh2: ED25519-CERT ID niall_1503934975 (serial 0) CA ED25519 bd:0b:55:9f: 84:be:ad:e9:eb:ac:7e:8c:83:ed:4d:cb
  • 26. Bastion
 SSH cert + 2FA App Instances