Timeline for SSH password vs. key authentication
Current License: CC BY-SA 3.0
6 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Nov 26, 2023 at 18:40 | comment | added | mckenzm | Did nobody change passwords on initial login back in 2013? | |
| Mar 29, 2013 at 15:54 | comment | added | Piskvor left the building |
.ssh/authorized_keys is but the most common way of managing the public keys (and a matter of setting up sshd_config); there are various centralized solutions in use.
|
|
| Mar 29, 2013 at 15:10 | comment | added | Lie Ryan | Private key files can also be invalidated and reset in centralized manner. | |
| Mar 29, 2013 at 15:09 | comment | added | Jan Hudec | Do you have anything to say to the second case, account for use by another application rather than interactive user? | |
| Mar 29, 2013 at 15:07 | comment | added | Jan Hudec | The passwords he issued were generated. Basically guaranteed they will be written down. | |
| Mar 29, 2013 at 15:02 | history | answered | Tom Leek | CC BY-SA 3.0 |