Back to list
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Re: Unix (pam) authorization with required public key
Sep 01 2010 07:46AM
Aris Adamantiadis (aris adamantiadis belnet be)
Le 01/09/10 01:35, Robert Hajime Lanning a Ã©crit :
> ssh is not written to do that.
> It authorizes on first successful authentication.
The SSH2 protocol certainly permits this. It's a partial authentication,
and permits to force the client to use another authentication mean while
[ more ]
Copyright 2010, SecurityFocus