Correct... In addition to using certificate-based logons, rather than
password-based logons.






*ASB **http://XeeMe.com/AndrewBaker* <http://xeeme.com/AndrewBaker>
*Providing Virtual CIO Services (IT Operations & Information Security) for
the SMB market...*




On Mon, Apr 14, 2014 at 6:31 PM, Kurt Buff <[email protected]> wrote:

> Aside from using public keys vs. passwords?
>
> Kurt
>
>
> On Mon, Apr 14, 2014 at 9:14 AM, Andrew S. Baker <[email protected]>wrote:
>
>> Good afternoon:
>>
>> I have an interesting question about secure configuration between puppet
>> orchestration master servers and their minions.
>>
>> (for those who don't use puppet, you can look at it here:
>> http://puppetlabs.com/puppet/puppet-enterprise )
>>
>> The question pertains to using SSH to secure the communication between
>> the master server and its slave servers.  What other mechanisms would you
>> consider to ensure that this SSH connection does not get abused?  (As it
>> would essentially be always active)
>>
>> Regards,
>>
>>
>>
>>
>>
>>
>> *ASB **http://XeeMe.com/AndrewBaker* <http://xeeme.com/AndrewBaker>
>> *Providing Virtual CIO Services (IT Operations & Information Security)
>> for the SMB market...*
>>
>>
>>
>

Reply via email to