Re: Handling of empty secrets





Em 2011/4/5 Dan Williams <dcbw redhat com>
What situations do you need these in? (empty secrets)

Said you have a certificate-based VPN connection. As each VPN user have its own certificate, and certificate's key is password protected, one can assume that no further authentication is needed.



[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]