Securing your account: Difference between revisions

Jump to navigation Jump to search
no edit summary
No edit summary
No edit summary
Line 3: Line 3:
<translate>
<translate>
= Authentication = <!--T:1-->
= Authentication = <!--T:1-->
There are two primary authentication mechanisms that are used to connect to a cluster : passwords and SSH keys. Below are some best practices for both methods.  
There are two primary authentication mechanisms that are used to connect to a cluster: passwords and SSH keys. Below are some best practices for both methods.  


== Password best practices == <!--T:2-->
== Password best practices == <!--T:2-->
cc_staff
176

edits

Navigation menu