Nowadays with the fastest pace that people are joining and leaving companies, every system administrator wants to be able to control and audit the accesses to his infrastructure. In this talk, we're going to have a brief explanation of how asymmetric keys works and it can be used to establish secure connections to instances shells at large scale
Highly passionate about automation, monitoring, and reliability. Always looking forward to building ultra-scalable and highly reliable and resilient systems. And also love to ride bikes 🏍.
Title
a(SSH)ymmetric keys made easy
Abstract
Nowadays with the fastest pace that people are joining and leaving companies, every system administrator wants to be able to control and audit the accesses to his infrastructure. In this talk, we're going to have a brief explanation of how asymmetric keys works and it can be used to establish secure connections to instances shells at large scale
Speaker Name
Marcelo Almeida
Speaker BIO
Highly passionate about automation, monitoring, and reliability. Always looking forward to building ultra-scalable and highly reliable and resilient systems. And also love to ride bikes 🏍.
Speaker Company
Talkdesk