You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Nowadays with the fastest pace that people are joining and leaving companies, every system administrator wants to be able to control and audit the accesses to his infrastructure. In this talk, we're going to have a brief explanation of how asymmetric keys works and it can be used to establish secure connections to instances shells at large scale
Highly passionate about automation, monitoring, and reliability. Always looking forward to building ultra-scalable and highly reliable and resilient systems. And also love to ride bikes 🏍.
Speaker Company
Talkdesk
The text was updated successfully, but these errors were encountered:
Title
a(SSH)ymmetric keys made easy
Abstract
Nowadays with the fastest pace that people are joining and leaving companies, every system administrator wants to be able to control and audit the accesses to his infrastructure. In this talk, we're going to have a brief explanation of how asymmetric keys works and it can be used to establish secure connections to instances shells at large scale
Speaker Name
Marcelo Almeida
Speaker BIO
Highly passionate about automation, monitoring, and reliability. Always looking forward to building ultra-scalable and highly reliable and resilient systems. And also love to ride bikes 🏍.
Speaker Company
Talkdesk
The text was updated successfully, but these errors were encountered: