You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Fix parse error when using key fingerprints
The last release broke using private key fingerprints. This change fixes
that up so that we properly delineate fingerprints and kms urls and
handle them each appropriately.
Introducing Google Cloud KMS signing
If you're a google cloud user you can root your CA in one of their keys
instead of mucking around with keys in ssh-agent.
I also ported us to go modules with this change.
Build enhancements
This version includes changes to the Makefile and docker building environment.
We also move to go 1.9 and the Docker containers are based on ubuntu 16.04
instead of 15.10
Add ability to inject critical options into certs
You may now specify CriticalOptions in sign_certd's config on a
per-environment basis. This allows you to write a policy that says all
certs against this environment will have exactly these critical options.
You can ensure that certs always launch users into restricted shells or
from a defined range of source IPs as supported by sshd.
Add tool for generating KMS-encrypted CA keys
Previously you had to run ssh-keygen temporarily storing the output in a
file before using this utility to encrypt the key. Now you can simply
have this tool generate the key and send the private directly to KMS for
encryption. This should be both simpler and more secure.