What benefits do you see? I mean, you still expose some binary that implements authentication and authorization using cryptography.
I think that even RBAC scenarios described in the link above should be achievable with OpenSSH, right?
What benefits do you see? I mean, you still expose some binary that implements authentication and authorization using cryptography.
I think that even RBAC scenarios described in the link above should be achievable with OpenSSH, right?