stevenriz
IS-IT--Management
- May 21, 2001
- 1,069
I know this is used to obtain to a linux machine without the password as loong as you have the key. My question is this. What is the best way to remove this type of authentication? Would I simply just delete this directory alltogether? We are currently using iptables as the primary firewall with our IP addresses configured and SSH/SFTP for access. Anyone know how best to cease authorized_keys?