Download
| Alert*
The Host-Based Authentication should be enabled or disabled as appropriate
SSH's cryptographic host-based authentication is more secure than .rhosts authentication. However, it is not recommended that hosts unilaterally trust one another, even within an organization.
|