Secure Shell
Name:
Email:
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Subject:
Message:
 
Re: Unix (pam) authorization with required public key Sep 01 2010 01:06AM
Dan Mahoney, System Admin (danm prime gushi org)
On Tue, 31 Aug 2010, Robert Hajime Lanning wrote:

> ssh is not written to do that.
>
> It authorizes on first successful authentication.
>
> The closest thing you can do is distribute PKCS#11 compatible hardware
> tokens and configure the ssh client to use the key from there.
>
> This will implemen...

[ more ]  
 

Privacy Statement
Copyright 2010, SecurityFocus