You can increase security even more by protecting the private key with a passphrase. When the two match up, the system unlocks without the need for a password. You can place the public key on any server, and then unlock it by connecting to it with a client that already has the private key. The private keys are called identity keys. The private keys need to be stored and handled carefully, and no copies of the private key should be distributed. Only a user in possession of a private key that corresponds to the public key at the server will be able to authenticate successfully. The possession of this key is proof of the user's identity.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |