-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add signed key constraints to SSH CA #4468
Conversation
lengths when using Signed SSH Certificates via the SSH Secret Engine.
Maps are super unfriendly for CLI users so this needs to be rethought. Probably it should follow the key_type/key_bits values from the PKI backend. |
We discussed about this internally and agreed that accepting maps in this case is okay, given that there are 2 other fields that accept map inputs. As Jeff mentioned, it is a pain to work with map inputs in the CLI. However, the docs provide some examples to work with map inputs in CLI (https://www.vaultproject.io/docs/secrets/ssh/signed-ssh-certificates.html).
Currently the values specified impose length limits. We may want to change that to impose exact lengths (by changing |
Closing in favor of #6030 |
Adds the ability to enforce particular ssh key types and minimum key lengths when using Signed SSH Certificates via the SSH Secret Engine.
e.g.