Next step is to do more validation in the UI. Specifically: * validate authorized keys * detection of accidental use of a private key Then, password based access can be disabled. |
||
---|---|---|
.. | ||
converge | ||
templates |
Next step is to do more validation in the UI. Specifically: * validate authorized keys * detection of accidental use of a private key Then, password based access can be disabled. |
||
---|---|---|
.. | ||
converge | ||
templates |