On 12/11/17 23:49, Dan Becker wrote:
I am reading a blog proposing to use the AuthorizedKeyCommand to hook into
another authentication mechanism  by calling a shell script

https://blog.heckel.xyz/2015/05/04/openssh-authorizedkeyscommand-with-fingerprint/

Do I have a valid concern in thinking this might not be a prudent method of
authentication ?

AFAICT, he is using AuthorizedKeyCommand exactly as intended, generating authorized_keys entries on demand.

What are you concerned about?

/Alexander

Reply via email to