How to Set Up An SSH Key Agent
Last week I showed you how to set up cryptographic authentication for SSH. We got as far as the more secure part. In an analysis of a multi-year collection of several million SSH break-in attempts I didn’t see one that tried guessing cryptographic keys. Willie Sutton supposedly said that he robbed banks because that’s where […]
Set Up SSH Keys For Easier And More Secure Authentication
This week I will show you how to set up cryptographic authentication. Two Benefits at Once! Security and convenience are usually at odds, an increase in one usually has the collateral damage of driving the other one down. But cryptographic authentication is a rare opportunity to make things both more secure and easier to use. […]
Isn’t Corporate Identity Management Far Too Important to be Turned Over to Facebook?
Identity and Access Management or IAM is crucial as organizations move into the cloud. IAM allows an organization to centrally create, control and track individual identities, defining how users must first authenticate so that decisions can be made about what they are authorized to do. Typical corporations or government agencies use cloud products from multiple […]