logoalt Hacker News

throwway120385last Tuesday at 4:44 PM0 repliesview on HN

We also have thousands of devices accessible over SSH and we maintain our own PKI for this purpose as well. We also use mTLS with a private CA and chain of trust, for what it's worth.

It's a solved problem, basically.