Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

Vouch Server Operator Guide

This documentation covers deploying, configuring, and operating Vouch Server — the authentication server that issues short-lived credentials after FIDO2 verification with a YubiKey. It covers three deployment patterns: cloud, on-premise, and air-gapped.

For CLI installation, enrollment, integration guides (SSH, AWS, EKS, GitHub, Docker), and OIDC provider documentation (endpoints, tokens, grant types), visit vouch.sh/docs.

What Vouch Server Does

Vouch Server is the backend that makes hardware-backed authentication work:

  • OIDC Provider — Issues DPoP-bound access tokens after FIDO2 verification
  • SSH Certificate Authority — Signs short-lived Ed25519 certificates
  • Credential Broker — Exchanges access tokens for AWS STS credentials
  • SCIM Endpoint — Receives user provisioning/de-provisioning from your IdP
  • WebAuthn Relying Party — Manages FIDO2 credential registration and assertion

Architecture

ComponentDescriptionLicense
vouch CLIUser-facing commands, credential helpersApache-2.0 OR MIT
vouch-agentBackground daemon, session managementApache-2.0 OR MIT
vouch-commonShared types, FIDO2 helpers, API clientApache-2.0 OR MIT
Vouch ServerOIDC provider, certificate authorityApache-2.0 OR MIT

Security

Vouch is designed for high-security environments:

  • Memory-safe implementation — Written in Rust
  • No credential storage — Vouch never sees your private keys
  • Cryptographic presence attestation — FIDO2 with user verification
  • Short-lived credentials — Minimize blast radius of compromise
  • Audit trail — Every credential issuance logged with attestation

Get started with the Deployment Overview.