Category: Security, automation, ansible

In this blog post, I would like to share the story of how ZOOZ transitioned to using SSH certificate authentication for better security, usability, and management. Password authentication and public-key authentication are the most common SSH authentication methods: SSH key authentication is the authentication method that we used at ZOOZ until recently.

The process of managing SSH authentication is mostly done manually and has several drawbacks: It’s important to note the most if not all the pitfalls can be overcome with extensive automation and management.

Then all that is left is to configure clients and hosts to trust any certificates signed by our CA.

And of course, we also gained additional layers of security and efficiency.PayU is full of exciting technical challenges and our leadership encourages us to initiate and make an impact.

Related Articles