| ▲ | TZubiri 3 hours ago | |||||||
The capacity to grant access as a specific remote user is present without certs as well right? The typical authorized_keys file lives under a user directory and grants access only to that user. | ||||||||
| ▲ | blueflow 3 hours ago | parent [-] | |||||||
The main advantage of certificates is that you are able to do that from the CA without touching the target machine. | ||||||||
| ||||||||