Secure Shell
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Re: Unix (pam) authorization with required public key Sep 01 2010 01:06AM
Dan Mahoney, System Admin (danm prime gushi org)
On Tue, 31 Aug 2010, Robert Hajime Lanning wrote:

> ssh is not written to do that.
> It authorizes on first successful authentication.
> The closest thing you can do is distribute PKCS#11 compatible hardware
> tokens and configure the ssh client to use the key from there.
> This will implemen...

[ more ]  

Privacy Statement
Copyright 2010, SecurityFocus