User masquerading - audit trail?

John D. Mitchell jdmitchell at gmail.com
Sat Jan 17 05:54:56 UTC 2009


On Friday 2009.01.16, at 19:04 , Jeremy Lizakowski wrote:
[...]
> Theory aside, I just want to know that 3rd party contractors are  
> legitimately identifying themselves.  I think this would be  
> interesting beyond that, but I'm just looking for a specific solution.

Sounds like you should only allow them to connect via SSH and then  
you'd be good to go.  And that gives you a secure communication  
channel as well.

Take care,
John




More information about the Mercurial mailing list