logoalt Hacker News

lokaryesterday at 8:10 PM1 replyview on HN

Exactly. This is really useful in larger organizations where you may want more complex rules on access. For example, you can easily build "break glass" or 2nd party approved access on demand. You can put whatever logic you need in a CA front-end.

You can also make all the certs short-lived (and only store them in ram).


Replies

TZubiriyesterday at 11:02 PM

The way I've been doing that is with Shamir Secret Sharing and encrypting keys until glass-breaking is necessary.

show 1 reply