Next step is to do more validation in the UI. Specifically: * validate authorized keys * detection of accidental use of a private key Then, password based access can be disabled. |
||
|---|---|---|
| .. | ||
| converge | ||
| templates | ||
Next step is to do more validation in the UI. Specifically: * validate authorized keys * detection of accidental use of a private key Then, password based access can be disabled. |
||
|---|---|---|
| .. | ||
| converge | ||
| templates | ||