-
|
Hi, I followed this wonderful blog post about setting up a CA with step and a RasPi. Now that I have that working, I'd like to use the CA for ssh certs. How do I incorporate that into my Yubikey setup? |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 18 replies
-
|
Hi @ProfessorSalty, Thanks for the kind words, I'm glad the tiny CA is working out for you!
We don't have a tutorial for adding SSH support, but I can give you an overview of the steps you'll need to take:
You should now be able to retrieve the SSH host and user CA keys from any You can also configure a CA with SSH host and user templates — which are used to make it easier to set up new clients and hosts, using If setting it up on the YubiKey turns out to be too much of a hassle, an alternative would be to run an SSH CA on disk, but I don't think Further reading: Our docs on YubiKey PIV support Hope this helps, |
Beta Was this translation helpful? Give feedback.
-
|
@tashian - sorry for the resurrection but I think it makes sense to have this information on this discussion. Do you know why things do not work if I import the SSH CA keys generated by If I do |
Beta Was this translation helpful? Give feedback.
Hi @ProfessorSalty,
Thanks for the kind words, I'm glad the tiny CA is working out for you!
step-ca, which supports using additional YubiKey PIV certificate slots 82-95 (called the "retired key management slots"). Otherwise you won't have enough certificate slots to have both X.509 and SSH CAs.We don't have a tutorial for adding SSH support, but I can give you an overview of the steps you'll need to take:
Stop your
step-caGenerate SSH CA private keys on the YubiKey (probably into slots 82 and 83— but that depends on your setup. Be careful here because
ykmanappears to overwrite slots without asking). You'll need to useykman…