OnePAM operates a built-in certificate authority that issues short-lived certificates after SAML/OIDC authentication. Certificates expire automatically, eliminating SSH key rotation, authorized_keys management, and orphan access. Enterprise SSH PKI without the complexity.
Why Certificate Authority Matters
certificates are the most secure method for SSH authentication, recommended by the NIST and used by companies like Facebook, Google, and Netflix. Unlike SSH keys (which persist indefinitely and must be manually managed), certificates have a built-in expiration time, carry identity information (who the certificate was issued to), and can encode authorization data (which servers the user can access). However, building and operating an certificate authority is complex — it requires key management, certificate issuance infrastructure, sshd configuration, and integration with identity providers. OnePAM provides a fully managed SSH CA that integrates with your SAML/OIDC Identity Provider. When users want to SSH, they authenticate via your corporate IdP, and OnePAM issues a certificate valid for 1-24 hours. The certificate includes the user's identity (principals), permitted hosts, and access restrictions. sshd is configured to trust OnePAM's CA (a one-time change), and certificates are accepted automatically. No authorized_keys files. No key distribution. No key rotation. Certificates expire and access stops — automatically.
Local Agent + CA
The agent configures sshd to trust OnePAM's CA automatically. Certificates are issued after IdP authentication. Works with standard SSH clients.
Gateway + CA
The gateway issues certificates and manages SSH credentials transparently. Target servers trust the CA's key. Combines zero-day protection with certificate-based authentication.
Risks of Static SSH Key Infrastructure
Without identity-based SSH access, these risks threaten your servers every day.
SSH Security Challenges
These are the risks organizations face with traditional SSH authentication.
No Built-In SSH PKI
OpenSSH supports certificates natively but provides no CA infrastructure. Organizations must build their own CA, issuance pipeline, and revocation system.
authorized_keys Fragmentation
SSH access authorization is stored in authorized_keys files on each server. No central view of who has access to what. Auditing requires examining every server.
Key Lifecycle Management
SSH keys must be generated, distributed, rotated, and revoked. Each step is manual, error-prone, and rarely completed across all servers.
No Identity in Keys
An SSH public key is just a cryptographic value. It doesn't encode who it belongs to, when it was created, or when it should expire.
Host Key TOFU Problem
First-time SSH connections to new servers trigger a trust-on-first-use (TOFU) warning. Users blindly accept, enabling man-in-the-middle attacks.
Service Account Keys
Service accounts (Ansible, Jenkins, monitoring) use SSH keys that are shared, never rotated, and persist indefinitely. They're the highest-risk SSH credentials.
How OnePAM's Certificate Authority Works
Step-by-step guide to deploying identity-based SSH access.
OnePAM Hosts the SSH CA
OnePAM operates a fully managed certificate authority. No HSM procurement, no PKI expertise required.
Servers Trust the CA
Add OnePAM's CA public key to sshd_config. A one-time change on each server.
Users Authenticate via IdP
When a user wants to SSH, they authenticate via your SAML/OIDC IdP with MFA.
Certificate Issued
OnePAM signs a short-lived certificate (1-24 hour TTL) with the user's identity and access permissions.
Connect and Auto-Expire
Users run 'onepam ssh server' to connect. sshd validates the CA signature and grants access. When the certificate expires, access stops.
Benefits of Certificate Authority
What changes when you deploy identity-based SSH access.
Managed SSH PKI
Enterprise certificate authority without HSM procurement, PKI expertise, or custom infrastructure. OnePAM manages the CA for you.
Zero PKI infrastructure to manageAuto-Expiring Access
Certificates expire after 1-24 hours. No orphan access, no stale credentials, no manual revocation for routine access lifecycle.
Automatic access expirationIdentity-Encoded Certificates
Certificates carry the user's corporate identity — username, email, groups. Every SSH session is attributable to a verified individual.
Full identity attributionEliminate authorized_keys
No more managing authorized_keys files on servers. sshd trusts the CA and certificates handle access authorization.
Zero authorized_keys managementSolve the TOFU Problem
OnePAM issues host certificates so clients can verify server identity. No more 'Are you sure you want to continue connecting?' prompts.
No more host key warningsService Account Certificates
Service accounts get their own certificates with restricted principals and short TTLs. Replace shared SSH keys with attributable certificates.
Secure service account accessSSH SSO Capabilities
Every feature needed for enterprise-grade SSH authentication.
Zero-Day Protection Features
Enterprise-grade security controls for SSH access.
Certificate Authority Use Cases
Common scenarios where organizations deploy OnePAM SSH SSO.
Certificate Authority FAQ
Common questions about SSH SSO and zero-day protection.
What is an certificate authority?
Do I need to modify sshd_config on every server?
What happens when a certificate expires?
Can certificates be revoked before expiration?
How do host certificates work?
Does OnePAM's CA support hardware security modules (HSM)?
Deploy Enterprise SSH PKI
Short-lived certificates tied to corporate identity — managed for you.