-
Hello! I'm just playing around with step ca and I'm wondering about what kinds of protections I need against unauthorized users using my public-facing step CA server. As already discussed in #787, anyone can bootstrap against my Internet facing CA server. However, only actual authorized users can generate certificates anyways. For example, if I am using an OIDC provisioner in step ca, then only those valid users in that OIDC can generate things like SSH keys. However, there seem to be some public endpoints that do NOT require any kind of authorization. For example, as far as I can tell, there's nothing that stops unauthorized users from running |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 4 replies
-
Hi @alirazeen, great questions. I've been working on a documentation section about this but it is still an early draft. The main areas of concern are:
With ACME provisioners, the concerns are:
Generally speaking, it would make sense to create an allowlist of endpoints in your reverse proxy server—the minimum to allow your clients to enroll—and only forwarding those to |
Beta Was this translation helpful? Give feedback.
Hi @alirazeen, great questions.
I've been working on a documentation section about this but it is still an early draft.
The main areas of concern are:
ssh hosts
list, as you mentioned/provisioners
endpointWith ACME provisioners, the concerns are:
/provisioners
…