<br><br><div class="gmail_quote">2008/1/23 Mikkel L. Ellertson <<a href="mailto:mikkel@infinity-ltd.com">mikkel@infinity-ltd.com</a>>:<br><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
<div class="Ih2E3d">Aldo Foot wrote:<br>><br>> Controlling access to the media storing the keys and accounts is of my<br>> greatest concern in particular if the system is located in some other city and<br>> someone else admins the machine.
<br>><br>> Maybe I'm too paranoid.<br>><br></div> Now, if you can arrange things so that<br>you do not need root access on the remote machine, then you can<br>create a user specifically for the access, and limit the access. If
<br>you have to allow automated remote access, then there is no way to<br>make it totally safe. But you can limit the damage that can be done.<br><div><div></div><div class="Wj3C7c"><br>Mikkel<br>--<br><br> </div></div></blockquote>
<div> </div><div>Thanks for the great advice guys. <br>I'll play with this over the next few days.<br>I have much to learn.<br><br>~af <br></div></div><br>