This resource is no longer available
The Technical Complexities and Risks of Public Key Authentication: The Lack of SSH User Key Management in Large Enterprises Today
SSH (Secure Shell) user keys are often used to grant system administrators access to the computers they manage. Unfortunately, many organizations don’t have the essential defined processes for effectively managing SSH user keys, introducing a number of security risks. This resource highlights ten (10) technical challenges and risks related to public key authentication and the lack of SSH user key management, as well as an effective approach for addressing them.