Jump to content

User Key: Difference between revisions

From Hackerpedia
imported>Unknown user
No edit summary
 
imported>Unknown user
No edit summary
 
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
{{LanguageHeader|en}}
{{LanguageHeader|en}}
{{CyberTerm|definition=A key that is used for granting access to a user account via the SSH protocol (as opposed to a host key, which does not grant access to anything but serves to authenticate a host). Both authorized keys and identity keys are user keys. A user key is the equivalent of an access token.|source=NISTIR 7966}}
{{CyberTerm|definition=A key that is used for granting access to a user account via the SSH protocol  (as opposed to a host key, which does not grant access to anything but serves to authenticate a host). Both authorized keys and identity keys are user keys. A user key is the equivalent of an access token.|source=NISTIR 7966}}

Latest revision as of 00:24, 20 January 2026

Languages: English | Français

User Key

A key that is used for granting access to a user account via the SSH protocol  (as opposed to a host key, which does not grant access to anything but serves to authenticate a host). Both authorized keys and identity keys are user keys. A user key is the equivalent of an access token.


Source: NISTIR 7966 | Category: