Re: Hacking in ssh support

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sun, 13 Jan 2008, Steve Milner wrote:

Personally it seems that if someone is using ssh keys they will just use ssh instead of func with their own home grown scripts.

Unless they want the extra stuff that func delivers out of the box, like centralized audit capability. Which tends to be one of the things that is a big pain in the ass for homegrown solutions: proper auditing *always* comes later, and usually when something terrible has happened.

--g

--
Greg DeKoenigsberg
Community Development Manager
Red Hat, Inc. :: 1-919-754-4255
"To whomsoever much hath been given...
...from him much shall be asked"

_______________________________________________
Func-list mailing list
Func-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/func-list

[Index of Archives]     [Fedora Users]     [Linux Networking]     [Fedora Legacy List]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [KDE Users]

  Powered by Linux