Skip to main content

Timeline for SSH password vs. key authentication

Current License: CC BY-SA 3.0

6 events
when toggle format what by license comment
Nov 26, 2023 at 18:40 comment added mckenzm Did nobody change passwords on initial login back in 2013?
Mar 29, 2013 at 15:54 comment added Piskvor left the building .ssh/authorized_keys is but the most common way of managing the public keys (and a matter of setting up sshd_config); there are various centralized solutions in use.
Mar 29, 2013 at 15:10 comment added Lie Ryan Private key files can also be invalidated and reset in centralized manner.
Mar 29, 2013 at 15:09 comment added Jan Hudec Do you have anything to say to the second case, account for use by another application rather than interactive user?
Mar 29, 2013 at 15:07 comment added Jan Hudec The passwords he issued were generated. Basically guaranteed they will be written down.
Mar 29, 2013 at 15:02 history answered Tom Leek CC BY-SA 3.0