On Thu, 19 Feb 2004 08:35:28 +0000, Nick Ing-Simmons wrote: > > How about layering it on ssh then? > That has done all authentication stuff already.
I agree. With empty passphrases and/or ssh-agent it is very easy to set up automated commands. Add forced commands (an under-appreciated feature of ssh) to restrict what can be done on the remote host and you've excellent security control over the entire environment. Scott