Confirmed users
529
edits
Gdestuynder (talk | contribs) |
|||
| Line 137: | Line 137: | ||
* The recommended settings are identical to the user keys. | * The recommended settings are identical to the user keys. | ||
* The keys must be accessible only by the admin user (root) and/or the system user requiring access. | * The keys must be accessible only by the admin user (root) and/or the system user requiring access. | ||
Usage of machine keys should be registered in an inventory (a wiki page, ldap, an inventory database), to allow for rapid auditing of key usage across an infrastructure. | |||
== PGP/GnuPG == | == PGP/GnuPG == | ||