Using the Mesh to manage SSH

Managed strong credentials

[describe]

Once configured, SSH is pretty easy to use. But configuring SSH in a way that takes full advantage of the security advantages it offers is actually quite a task.

Properly configured Public key authentication is much more secure than using passwords. But merely configuring a system with password on authentication to use public key actually weakens rather than improves security: now there are twice as many points to attack. To make a password-only system more secure, you need to stop using passwords altogether and only use the public key scheme for remote access.

If you are a

Creating an SSH client profile

Connecting devices to an SSH client profile

Future work