Back to list
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Re: Unix (pam) authorization with required public key
Sep 01 2010 01:06AM
Dan Mahoney, System Admin (danm prime gushi org)
On Tue, 31 Aug 2010, Robert Hajime Lanning wrote:
> ssh is not written to do that.
> It authorizes on first successful authentication.
> The closest thing you can do is distribute PKCS#11 compatible hardware
> tokens and configure the ssh client to use the key from there.
> This will implemen...
[ more ]
Copyright 2010, SecurityFocus