Certificate of authority
In summary, you don't need to update the server certificate when creating or updating user certificates with your CA. Server identity is established through its host keys, which is separate from user certificates.
Additional Information:User certificates offer centralized authentication, and a user's certificate signed by the trusted CA key will work on any server configured to trust that CA.
This approach simplifies key management, especially in larger environments with multiple SSH servers.
(Note: This method is outdated and has been part of OpenSSH for a long time.)>
While both mechanisms provide SSH authentication, they serve different purposes and have different security implications.
Signed certificates offer a more structured and secure approach, particularly in complex environments.
Host-based authentication is suitable for trusted, well-controlled environments.
Note: Remember that the choice of authentication method should align with your security requirements and operational needs.
[ CA SSH ] Private Key Pair | | (ca_ed25519, ~/.ssh/keys) V | | V +-------|--------------+ | V | | [User A] (opc) | (user_opc_ed25519, ~/.ssh/keys) | Public Key | | Certificate | | (user_opc_ed25519-cert.pub) | | | | | | | V | V +---|-------|---+ +---|-------|---+ | V V | | V V | | [User A] | | | [User B] | | | Public Key | | | Public Key | | | Certificate| | | Certificate| | | (user_opc_ed25519) | | (user_bob_ed25519) | | | | | | | | | | | | | | | | | V V V V V V V V +-------+ +-------+ +-------+ +-------+ | | | | | | | | | User A| | User A| | User B| | User B| | | | | | | | | +-------+ +-------+ +-------+ +-------+