Back to Webinars
On-Demand 60 min

Certificate-Based SSH: Deep Dive

Technical deep dive into replacing SSH keys with certificates. Learn the architecture, implementation patterns, and security benefits of modern SSH certificate-based authentication.

Watch this webinar on-demand

Watch Now

Overview

SSH keys have been the standard for server access for decades, but they come with significant security and operational challenges. Long-lived static keys are difficult to rotate, easy to lose track of, and create sprawling attack surfaces.

This technical webinar explores how SSH certificates solve these problems by providing short-lived, automatically rotated credentials that can be issued on-demand with fine-grained permissions. You'll learn the OpenSSH certificate protocol, implementation patterns, and real-world deployment strategies.

What You'll Learn

  • How OpenSSH certificates work under the hood
  • Setting up a certificate authority for SSH
  • Implementing automated certificate issuance and rotation
  • Principal and extension-based access controls
  • Migration strategies from SSH keys to certificates
  • Troubleshooting common certificate deployment issues

Key Topics Covered

  • OpenSSH certificate format and protocol internals
  • User certificates vs. host certificates
  • Certificate principals and validity periods
  • Critical options: force-command, source-address, port-forwarding
  • Configuring sshd_config for certificate authentication
  • Certificate authority trust distribution
  • Automated certificate renewal workflows
  • Certificate revocation and emergency response
  • Integration with identity providers (OIDC, SAML)
  • Performance and scalability considerations

Featured Speaker

Marcus Rodriguez

Senior Infrastructure Engineer

Marcus is a systems engineering expert with deep knowledge of SSH protocols and PKI infrastructure. He has implemented certificate-based SSH at scale for major tech companies.

Ready to Secure Your Infrastructure?

Join thousands of security-conscious teams using TigerAccess to protect their critical infrastructure and AI agents.

No credit card required • 14-day free trial • Enterprise support available