Ephemera

A Zero-Trust SSH Certificate Authority

Ephemera is a sovereign, air-gapped SSH Certificate Authority designed to replace static keys with short-lived, identity-bound certificates. No long-lived private keys on user devices. Certificates are issued just-in-time and expire automatically.

What Ephemera Is

Ephemera is a self-hosted SSH Certificate Authority built on native OpenSSH features. It replaces long-lived SSH keys with short-lived certificates issued just-in-time, with explicit physical presence and auditable privilege escalation.

It is designed for teams that want centralized SSH governance without MITM proxies, custom protocols, or cloud dependencies.

What Ephemera Is Not

Not an SSH proxy or MITM gateway : Ephemera is not a shim or gateway. It operates solely at the certificate issuance and policy level.

Not a PAM replacement : While it integrates with PAM for sudo approval, it does not replace the system's underlying authentication modules.

Not a runtime monitoring tool : It does not monitor active SSH sessions or network traffic.

Not a cloud service : Ephemera is exclusively self-hosted for maximum sovereignty.

Not a SIEM : It is a CA with audit capabilities, not a security information and event management platform.

Why Ephemera?

Traditional SSH relies on long-lived private keys spread across laptops and servers. Once a key leaks, access persists until you discover it and rotate keys everywhere. Ephemera replaces static keys with short-lived certificates that expire automatically, shrinking the window of misuse from months to minutes.

Status

Core SSH CA : Production ready (v3.3.0)

Fuzz Soak : 1,000,000 internal iterations passed (0 mismatches)

OpenSSF Best Practices : Passing

Architecture

User + WebAuthn
    → Ephemera CA (policy, signing, ledger)
        → SSH servers (TrustedUserCAKeys)
        → Audit log (tamper-evident chain)
            

Full architecture documentation →

User WebAuthn Short-lived cert SSH Logged sudo

Properties

Zero-Trust : No permanent SSH keys. Certificates expire in minutes.

WebAuthn MFA : Phishing-resistant authentication via hardware keys or biometrics. (Setup guide)

JIT Sudo : Privilege escalation requires fresh MFA approval, logged centrally.

Tamper-Evident Audit : Merkle-chained ledger. History cannot be rewritten without detection.

Sovereign Recovery : Self-hosted backups with Shamir secret sharing. No cloud dependency.

Experimental: Trust Budgeting (Opt-in)

Ephemera can optionally enforce issuance-time trust budgets to limit cumulative privileged authority. This is a governance mechanism, not a runtime control or security guarantee.

Read the Trust Budgeting documentation →

Get Started

  1. Read Threat Model : Security assumptions and non-goals
  2. Review Architecture : Components and trust zones
  3. Try CLI Workflow : Local deploy and first certificate
  4. Explore Trust Budgeting : Governance primitive (experimental)

Documentation

Ephemera is open source under the Apache 2.0 license.
codeberg.org/Qarait/ephemera