Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I was trying to configure user authentication in SSH using certificate method.
As u all know the usual way of authentication is using the ssh-keygen method. But i want the another method where we create a certificate key and send it to the CA, which signs it and send back etc etc..
I cannot find any unique procedure in the net to configure this method.
Not everything in life has a "step by step guide". there should be details in the source code for the additional functionality it provides. Note that this is NOT a common thing to want to do, so you need to appreciate you'll possibly need to think more about what you're doing, and not want a "dummies guide" here. From what it does I can't imagine it's exactly tricky - configure the server to look at the right root CA certs and tell the client where it's certificate is, and enable that authentication method i should imagine. within SSH there can't be much more too it.
Last edited by acid_kewpie; 03-19-2010 at 08:02 AM.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.