1 |
On Thu, Oct 17, 2013 at 08:59:15AM +0200, Alan McKinnon wrote |
2 |
|
3 |
> Accessing the actual backend network is a two stage process: ssh key to |
4 |
> the jump host, then password to get onto the actual destination. |
5 |
> |
6 |
> So it's "two factor" as a generic English language phrase, not "two |
7 |
> factor" as a technical description of an exact thing. Keep in mind that |
8 |
> English is a highly overloaded language :-) |
9 |
|
10 |
I apologize. That is arguably a two factor system. When you said |
11 |
"ssh key and password", I "jumped to delusions", assuming that it was a |
12 |
standard ssh connection with the option of either key or password. Does |
13 |
the jump host restrict you to logging on to the account corresponding to |
14 |
the key? I.e. would John Smith got to the jump host with his key, could |
15 |
he log in to the Jane Doe account, or only John Smith. |
16 |
|
17 |
-- |
18 |
Walter Dnes <waltdnes@××××××××.org> |
19 |
I don't run "desktop environments"; I run useful applications |