Slide 44
Slide 44 text
Distributing Credentials
1. Seed credentials in the OS image!
2. Commit encrypted config data to DVCS repository!
3. Asymmetric encryption
Pros Cons
Public/Private key pair may
already exist
Requires mature, possibly
automated cert infrastructure
Easy rotation and revocation Limited implementations
No shared secret