Cloudflare Introduces OpenID Support for SSH
13:31, 26.03.2025
Cloudflare has announced the introduction of OpenID Connect (OIDC) support for SSH access, opening up new opportunities to improve security and usability when managing remote servers. This move enables the integration of modern authentication protocols with existing SSH infrastructure.
Why is This Important?
Traditional SSH authentication methods often rely on the use of access keys, which can pose a threat if they are compromised. Integration with OpenID Connect enables multi-factor authentication and centralized access control, minimizing the risks of unauthorized access.
How Does It Work?
With the introduction of OpenID, administrators will be able to configure SSH access so that users are authenticated through an identity provider that supports OIDC, such as Google, Microsoft, or any other protocol-compliant services. Upon successful authentication, the user is provided with a temporary token that is used to connect via SSH.
The OpenID Provider (OP) issues an ID token containing identification data (name of the organization, email address), which is then digitally signed, and with such action, OP confirms its authenticity.
Despite the fact that such tokens include identification data, they do not contain the user's public key. But OpenID Connect can add keys to ID tokens, allowing them to be used as SSH certificates.
The Future of SSH Security
Cloudflare continues to strengthen the protection of critical services by making SSH access more flexible and secure. OpenID Connect integration is a step towards user and administrator convenience.