When I started my new job, last year, my first task was to redesign the infrastructure and move from EC2 Classic to EC2 VPC. I spent the first few weeks setting up a new VPC with different subnets for each concern, a bastion server to access the servers located within the network and a consul cluster to keep track of the running instances.
In the past, I used several ways to manage the accounts and keys to access my servers:
- a central LDAP server, but no jump host;
- a jump host which was using SSH Agent forwarding to access the other servers, but only a handful of accounts/keys managed manually;
- a jump host, and all the accounts created on each server by Ansible, but using the SSH public keys exposed by GitHub to authenticate the user.
I didn’t want to have to create the accounts on all the servers, and I wanted to avoid LDAP, because it would introduce a single point of failure and its management is a bit of a pain.