Skip to content

Always try authentication using personal access #585

@jon4hz

Description

@jon4hz

Heya,

I noticed that The Bastion won't try to authenticate using the personal access key, if a user has access to a server through a group membership only.
However, I think it would be useful, if there was an option to always try the personal access key as well.

Considering the following scenario:

I have a fleet of - let's say - 200 servers and 20 users that need to access them. All those servers have sssd configured and fetch the personal pubkey from an LDAP using sss_ssh_authorizedkeys.
To make the access management as simple as possible, I would like to create a group my-server-admins and promote one of those 20 users to an aclkeeper, so that they can add more servers to their fleet without requiring bastion admin permissions.
However, if a user has access to a server only through a group membership, The Bastion will only try to authenticate using the group's shared ssh key - which won't work as the servers require a personal key.

With the current implementation, a bastion admin would have to adjust the personal access for all those 20 users, if there are any changes to that fleet of servers. This could be avoided simply by always trying to authenticate using the personal access key.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions