You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
we generate a public/private keypair on the hardware and then copy the public key to the remote server.
Is this possible to do with algo - the only change needed is that instead of the script generating ssh keys, it will read a public key from a config file and add them to the deployed server (both when creating new or when update-users).
In fact the config.cfg users section can be enhanced to take optional user <-> public key mapping.
The text was updated successfully, but these errors were encountered:
sandys
changed the title
support for hardware generated certificates (MFA)
support for hardware generated certificates (MFA) using config.cfg
Mar 27, 2020
hi,
Also want to link to an earlier request that was closed - #996
hardware keys like the epass2003 is very popular for ssh - e.g https://sigg-iten.ch/learningbits/2014/11/13/first-steps-with-the-feitian-epass2003-smart-token-in-os-x/
we generate a public/private keypair on the hardware and then copy the public key to the remote server.
Is this possible to do with algo - the only change needed is that instead of the script generating ssh keys, it will read a public key from a config file and add them to the deployed server (both when creating new or when update-users).
In fact the config.cfg users section can be enhanced to take optional user <-> public key mapping.
The text was updated successfully, but these errors were encountered: