Automation in the context of multifactor authentication: Difference between revisions

Jump to navigation Jump to search
no edit summary
No edit summary
No edit summary
Line 16: Line 16:


=== <code>from="pattern-list"</code> === <!--T:5-->
=== <code>from="pattern-list"</code> === <!--T:5-->
This constraint specifies that the key can only be used from IP addresses that match the patterns. This is to ensure that this key is not used from computers other than the ones intended. The patterns list must include only IP addresses that fully specify at least the network class, the network, and the subnet, which are the first 3 sections of an IP address. For example, <code>192.168.*.*</code> would not be accepted, but <code>192.168.1.*</code> would be accepted.  
This constraint specifies that the key can only be used from IP addresses that match the patterns. This is to ensure that this key is not used from computers other than the ones intended. The patterns list must include only IP addresses that fully specify at least the network class, the network, and the subnet, which are the first 3 sections of an IP address, for example, <code>192.168.*.*</code> would not be accepted, but <code>192.168.1.*</code> would be accepted.  


=== <code>command="COMMAND"</code> === <!--T:6-->
=== <code>command="COMMAND"</code> === <!--T:6-->
rsnt_translations
56,420

edits

Navigation menu