Stop Sharing Keys: How Short‑Lived SSH Certificates Fixed Our Dev Access Mess

Ditch long‑lived SSH keys. A practical, low‑overhead guide to using short‑lived SSH certificates for secure, auditable developer access in small Indian teams.

Written by: Arjun Malhotra

A laptop keyboard and terminal with code, shot from above in a 2:1 aspect ratio
Image credit: Unsplash

We used to handle SSH access like most small teams: generate a keypair, ask new hires to paste the public key into a server’s authorized_keys, give contractors temporary access by emailing them a key, and pray. When someone left, we rotated a few keys, cursed at missing audits, and accepted the risk.

That all changed when we adopted short‑lived SSH certificates. For a team of eight working across client infra and a few cheap VPSes (many under ₹1,000/month), certificates cut the churn, removed shared keys, and made audits simple. I’ll explain how SSH certificates work in practice, why they’re a better fit for small Indian teams, and the tradeoffs you’ll hit once the honeymoon ends.

What SSH certificates actually buy you

How it looked for us (practical setup) We needed something simple and reliable—not Vault, not a heavy SSO integration, and not a manual daily chore. Our stack ended up like this:

The typical flow:

  1. Developer authenticates to the signing service via SSO.
  2. They upload their public key (or the service pulls it from a trusted store).
  3. The service signs the key with the CA and returns a cert valid for, say, 2 hours.
  4. The developer’s SSH client presents the cert and logs in—the server accepts it because it trusts the CA.

Why this fits small Indian teams

Real downsides and tradeoffs

Implementation tips that actually helped

When to consider heavier tooling If you need per‑command justifications, dynamic host certificates, or tight integration with secrets engines, look at Vault’s SSH backend or enterprise offerings. For most small teams in India balancing cost and complexity, a tiny CA + SSO check is adequate.

Conclusion Short‑lived SSH certificates won’t make every security problem disappear. You trade manual key chaos for a little operational complexity and a critical CA to manage. For our team, it was worth it: fewer shared keys, simpler offboarding, and a much clearer audit trail — all on the budget of a single small VPS and a couple of scripts.

If you’re tired of playing key whack‑a‑mole across servers, try a pilot: pick one bastion, deploy the CA, convert a small group of devs, and measure how many hours you save on onboarding and audits. Expect a few bumps, but the control you gain is real—and refreshing.