User masquerading - audit trail?
John D. Mitchell
jdmitchell at gmail.com
Sat Jan 17 05:54:56 UTC 2009
On Friday 2009.01.16, at 19:04 , Jeremy Lizakowski wrote:
[...]
> Theory aside, I just want to know that 3rd party contractors are
> legitimately identifying themselves. I think this would be
> interesting beyond that, but I'm just looking for a specific solution.
Sounds like you should only allow them to connect via SSH and then
you'd be good to go. And that gives you a secure communication
channel as well.
Take care,
John
More information about the Mercurial
mailing list