Back to Guides
SSHVenafiIntermediate

Venafi SSH Protect

Enterprise SSH certificate management at scale

10 min read
Venafi SSH Protect: Enterprise SSH certificate management at scale
TL;DR for SREs, Security Architects & Identity Teams
  • What it is: Enterprise platform for SSH certificate lifecycle management
  • When you need it: 500+ servers, compliance requirements, or security/PAM team demands it
  • Key value: Centralized policy, approval workflows, audit trails, and automated issuance
  • Who cares: Platform engineers, security architects, identity & PAM teams, compliance officers

1. When Native OpenSSH Isn't Enough

You can absolutely run SSH certificates with just OpenSSH. We covered that in our SSH Certificate Authority Setup guide.

But at some point, the DIY approach breaks down:

Where's the line? A mid-size SaaS with 200–500 Linux nodes can often manage with scripts and discipline. Large enterprises with thousands of servers, multiple teams, and compliance requirements hit the wall faster.

The signing bottleneck
  • • Who has access to the CA private key?
  • • How do they sign certificates securely?
  • • What happens when that person is on vacation?
No visibility
  • • How many SSH certificates exist?
  • • Which ones are expiring this month?
  • • Who has admin access?
Policy enforcement is manual
  • • Maximum validity periods? Honor system.
  • • Allowed principals? Whatever the signer decides.
  • • Source-address restrictions? Hope they remember.
Compliance gaps
  • • "Show me all SSH access granted last quarter"
  • • Audit trail lives in scattered log files
  • • No approval workflows for privileged access

The threshold: Once you're managing SSH certificates for 100+ servers or have compliance requirements, manual processes become a liability.

2. What Venafi SSH Protect Does

Venafi SSH Protect is an enterprise platform for SSH certificate lifecycle management. It sits between your users/automation and your SSH CA:

┌─────────────┐     ┌─────────────────────┐     ┌─────────────┐
│   Users     │     │   Venafi SSH        │     │   Servers   │
│   CI/CD     │────▶│   Protect           │────▶│   (trust    │
│   Automation│     │                     │     │    Venafi   │
└─────────────┘     │  • Policy engine    │     │    CA)      │
                    │  • CA management    │     └─────────────┘
                    │  • Audit logging    │
                    │  • Approval flows   │
                    └─────────────────────┘

Venafi sits in the request path between identities and the SSH CA, not in the SSH data path.

Core capabilities:

CapabilityWhat It Does
Centralized CAVenafi manages CA keys (or integrates with yours)
Policy enforcementMax validity, allowed principals, required extensions
Self-service requestsUsers request certs through portal or API
Approval workflowsManager approval for privileged access
InventorySee all SSH certificates across your environment
Audit trailEvery request, approval, and signing logged
Automated issuanceAPI/CLI for CI/CD integration

3. Architecture Options

Venafi SSH Protect offers flexibility in how it manages your SSH CA:

Option A: Venafi-managed CA

Venafi generates and stores the CA private key:

  • • Simplest deployment
  • • CA key protected by Venafi's security controls
  • • You trust Venafi with your CA
Option B: Bring your own CA

You provide an existing CA, Venafi orchestrates signing:

  • • CA key stays in your HSM or secure storage
  • • Venafi sends signing requests
  • • You maintain ultimate control
Option C: Distributed signing

Multiple CAs for different environments:

  • • Production CA vs. Development CA
  • • Regional CAs for latency
  • • Different CAs for different teams

Most enterprises start with Option A for simplicity, then move to Option B as they mature.

4. Key Features Deep Dive

Policy Engine

Define rules that every certificate must follow:

Policy: "production-servers"
├── Max validity: 8 hours
├── Allowed principals: [deploy, monitoring, oncall]
├── Required extensions: [permit-pty]
├── Forbidden extensions: [permit-port-forwarding]
├── Source address: required (must specify)
└── Approval: required for "oncall" principal

Policies are enforced automatically. A user can't request a 30-day certificate if the policy says 8 hours max.

On the host side, this policy is enforced via sshd_config:

# /etc/ssh/sshd_config (on each server trusting the Venafi CA)
TrustedUserCAKeys /etc/ssh/venafi_user_ca.pub
AuthorizedPrincipalsFile /etc/ssh/auth_principals/%u

Inventory and Discovery

Venafi can discover existing SSH keys and certificates across your infrastructure:

  • • Scan servers for authorized_keys files
  • • Identify unmanaged SSH access
  • • Find certificates issued outside Venafi
  • • Track expiration dates across everything

→ See our Certificate Discovery guide for discovery concepts.

Just-in-Time Access

Instead of long-lived certificates, users request access when needed:

1

User requests certificate for prod-db-01

2

Request goes to approval queue (if required by policy)

3

Manager approves

4

Venafi issues 4-hour certificate

5

User connects, does their work, certificate expires automatically

No standing access. No certificates to revoke. Audit trail of every access request.

CI/CD Integration

Automation gets certificates too:

# GitHub Actions example
- name: Get SSH certificate
  run: |
    vcert ssh getcred \
      --url https://venafi.example.com \
      --token ${{ secrets.VENAFI_TOKEN }} \
      --key-id "github-actions-${{ github.run_id }}" \
      --principal deploy \
      --validity 1h \
      --public-key ~/.ssh/id_ed25519.pub \
      --output ~/.ssh/id_ed25519-cert.pub

Certificate is issued for just this pipeline run, with minimal permissions.

The runner's ~/.ssh/config can then use the cert automatically:

Host prod-*.example.com
  User deploy
  IdentityFile ~/.ssh/id_ed25519
  CertificateFile ~/.ssh/id_ed25519-cert.pub

5. Comparison: DIY vs. Venafi

CapabilityOpenSSH NativeVenafi SSH Protect
CA managementManual key generationManaged, HSM-backed
Signingssh-keygen on CA machineAPI, portal, CLI
Policy enforcementScripts/disciplineAutomatic, centralized
Visibilitygrep through logsDashboard, reports
InventoryManual trackingAutomatic discovery
Approval workflowsEmail/ticketsBuilt-in, audited
Audit trailScattered log filesCentralized, queryable
RevocationNot really possibleCertificate holds, emergency revoke
IntegrationCustom scriptsREST API, CLI, Terraform
Compliance reportsBuild your ownPre-built, exportable

The honest take: DIY works fine for small environments. Venafi is for when "fine" isn't good enough—when you need compliance, scale, or your security team demands it.

6. Integration Points

Venafi SSH Protect connects to your existing infrastructure:

Identity Providers
  • • Active Directory / LDAP
  • • Okta, Azure AD, Ping
  • • SAML 2.0, OIDC

Map principals to identity groups

ITSM / Ticketing
  • • ServiceNow
  • • Jira
  • • Custom webhooks

"Engineer requests prod SSH access → ServiceNow CHG ticket auto-created → Manager approves in ServiceNow → Venafi issues 4-hour cert"

SIEM / Logging
  • • Splunk
  • • Elastic
  • • Any syslog destination

Every certificate event streamed for monitoring

Secrets Management
  • • HashiCorp Vault
  • • AWS Secrets Manager
  • • Azure Key Vault

Store and retrieve certificates securely

Configuration Management
  • • Ansible, Terraform, Puppet/Chef
  • • Automate CA trust distribution and certificate deployment

7. Deployment Models

SaaS (Venafi as a Service)
  • • Fastest deployment
  • • Venafi manages infrastructure
  • • Your CA keys in Venafi's cloud HSM
On-premises
  • • Full control over infrastructure
  • • CA keys stay in your datacenter
  • • Required for air-gapped environments
Hybrid
  • • Management plane in cloud
  • • CA keys on-premises in your HSM
  • • Best of both worlds

Typical deployment timeline (ballpark estimates):

SaaSDays to weeks (PoC can land in days)
On-premisesWeeks to months
Hybrid2-4 weeks

Actual timelines depend on environment complexity, team size, and change management requirements.

8. Migration Path

Already have SSH certificates? Here's how to migrate:

Phase 1: Inventory (Week 1-2)
  • • Deploy Venafi discovery
  • • Identify all existing SSH keys and certificates
  • • Map current access patterns
Phase 2: Parallel operation (Week 3-6)
  • • Set up Venafi CA (or import existing)
  • • Distribute Venafi CA trust alongside existing CA
  • • Start issuing Venafi certificates for new requests
  • • Both CAs work simultaneously
Phase 3: Migration (Week 7-12)
  • • Move teams to Venafi self-service
  • • Migrate CI/CD to Venafi API
  • • Old certificates expire naturally
  • • Monitor for stragglers
Phase 4: Cutover (Week 13+)
  • • Remove old CA trust
  • • Old certificates stop working
  • • Venafi is now the only path
  • • Decommission old CA

Key principle: Never do a hard cutover. Parallel operation lets you find problems without causing outages.

Real-world example

A mid-size fintech (~800 servers, 3 data centers) ran both CAs in parallel for 6 weeks. During week 4, they discovered a legacy Jenkins server still using the old CA—caught by Venafi's inventory scan, not an outage. By week 8, the old CA was decommissioned with zero service impact.

9. When to Choose Venafi vs. Alternatives

Venafi SSH Protect vs OpenSSH, Vault, step-ca, Teleport

Venafi isn't the only option for enterprise SSH certificate management. Here's how to decide:

SolutionBest ForLimitations
OpenSSH native< 100 servers, no compliance needsNo visibility, manual everything
HashiCorp VaultVault shops, secrets-focusedSSH is one of many features
smallstep step-caCloud-native, DevOps-firstLess enterprise features
TeleportFull SSH proxy/bastionReplaces SSH, not just certificates
Venafi SSH ProtectEnterprise scale, complianceCost, complexity

Choose Venafi when:

  • • You already use Venafi for TLS certificates
  • • Compliance requires detailed audit trails
  • • You need approval workflows
  • • Scale is 500+ servers
  • • Security team demands enterprise-grade

Choose alternatives when:

  • • Budget is limited
  • • You're cloud-native and want OSS
  • • You need full bastion/proxy (→ Teleport)
  • • You're a Vault shop and want one tool

10. Talking to Your Security Team

If you're advocating for SSH certificates internally, here's what security teams care about:

"How do we revoke access if someone leaves?"

→ Short-lived certificates. 8-hour validity means access is gone tomorrow without any action. For immediate revocation, Venafi supports certificate holds.

"How do we audit who accessed what?"

→ Every certificate request is logged with: requester, principals granted, validity period, approver (if applicable), timestamp. Exportable to SIEM.

"What if the CA is compromised?"

→ CA private key stored in HSM. Venafi's architecture means the key never exists outside the HSM. Plus: separate CAs for different environments limit blast radius.

"How does this integrate with our identity provider?"

→ Native integration with AD, Okta, Azure AD. Users authenticate with SSO, principals mapped from group membership.

"We need approval for production access."

→ Policy engine supports required approvals. Manager must approve before certificate is issued. Full audit trail.

11. Getting Started

If you're evaluating Venafi:

1

Start with your TLS use case

If you're already looking at Venafi Trust Protection Platform for TLS certificates, SSH Protect is an add-on module. Bundle pricing may apply.

2

Run a pilot

Pick one team or environment. Deploy for 3 months. Measure: time to access, audit completeness, incident response.

3

Calculate ROI

Hours saved on manual signing × cost per hour. Risk reduction from short-lived certs. Audit prep time saved.

If you're not ready for Venafi:

Start with native OpenSSH certificates:

You can always migrate to Venafi later when scale or compliance demands it.

FAQ

How much does Venafi SSH Protect cost?

Venafi doesn't publish pricing—it's enterprise sales. Expect per-server or per-certificate pricing. Request a quote and pilot.

Can I use Venafi just for SSH, not TLS?

Yes, SSH Protect can be deployed standalone. But most customers use it alongside Trust Protection Platform for TLS certificates.

Does Venafi replace OpenSSH?

No. Venafi SSH Protect is an SSH certificate management platform that works alongside OpenSSH. You still use OpenSSH on your servers and clients—Venafi manages the certificate lifecycle (issuance, policy, inventory, audit). The actual SSH connections are unchanged.

What about cloud instances that auto-scale?

Venafi supports automated certificate issuance via API. New instances request certificates at boot, using machine identity tokens. When instances terminate, certificates expire naturally.

Can Venafi manage SSH keys (not just certificates)?

Yes. Venafi can inventory and manage traditional SSH keys during migration. The goal is usually to move from keys to certificates, but Venafi handles both.

Is there a free trial?

Contact Venafi sales. They typically offer proof-of-concept deployments for qualified prospects.

Related Guides

SSH Certificate Series
Venafi & CLM
Related Concepts

→ Explore all SSH topics in our Guide Collection