Ways to Manage Your SSH Keys and Identities
Feb 1,
2017
I wrote a series of blog posts a while ago about SSH authentication using cryptographic keys rather than passwords. I discussed why SSH keys provide easier authentication, how to set up an SSH key agent, and how to maintain multiple websites. There are two areas of security to consider regarding SSH. I think of them […]
authentication,
compliance,
ECC,
Elliptic Curve Cryptography,
HIPAA,
IAM,
Identity and Access Management,
linux,
PCI DSS,
public-key cryptography,
RSA,
Sarbanes-Oxley,
SARBOX,
Security-Enhanced Linux,
SELinux,
SOX,
ssh
Isn’t Corporate Identity Management Far Too Important to be Turned Over to Facebook?
Jun 7,
2013
Identity and Access Management or IAM is crucial as organizations move into the cloud. IAM allows an organization to centrally create, control and track individual identities, defining how users must first authenticate so that decisions can be made about what they are authorized to do. Typical corporations or government agencies use cloud products from multiple […]