Configuring your OpenSSH servers to trust your SSH CA hosted by SSH Protect
Before you can begin issuing SSH certificates, you need to configure your OpenSSH servers to trust your SSH CA. This allows your clients to use SSH certificates to connect to these OpenSSH servers.
To configure an OpenSSH server to trust your SSH CA (for user authentication)
-
Retrieve the CA public key.
-
Use an existing SSH connection to connect to the host machine.
-
Create the following text file, then paste the CA's public key in the file, and save it.
/etc/ssh/trusted_user_ca_keys
-
Change the file permission so only ROOT can write to that file.
-
Configure the OpenSSH service to use the newly-created file by
-
Opening
/etc/ssh/sshd_config
-
Adding
TrustedUserCaKeys /etc/ssh/Trusted_user_ca_keys
-
-
Restart the OpenSSH service.
What's next
Now you have configured your host to use and trust the SSH CA, the final step is to configure your client to use and trust the SSH CA.