On Thu, Oct 17, 2013 at 08:59:15AM +0200, Alan McKinnon wrote

> Accessing the actual backend network is a two stage process: ssh key to
> the jump host, then password to get onto the actual destination.
> 
> So it's "two factor" as a generic English language phrase, not "two
> factor" as a technical description of an exact thing. Keep in mind that
> English is a highly overloaded language :-)

  I apologize.  That is arguably a two factor system.  When you said
"ssh key and password", I "jumped to delusions", assuming that it was a
standard ssh connection with the option of either key or password.  Does
the jump host restrict you to logging on to the account corresponding to
the key?  I.e. would John Smith got to the jump host with his key, could
he log in to the Jane Doe account, or only John Smith.

-- 
Walter Dnes <waltd...@waltdnes.org>
I don't run "desktop environments"; I run useful applications

Reply via email to