-
Improvement
-
Resolution: Not A Defect
-
Minor
-
None
I have read the following:
And exists the Host Key Verification Strategy option and we have available the following options:
1. Known hosts file Verification Strategy
2. Manually provided key Verification Strategy
3. Manually trusted key Verification Strategy
4. Non verifying Verification Strategy
Well, for security reasons, the 4th can be ignored. For the three first options, when would be mandatory use one approach over the other? - for what scenario(s)? - I am posting this issue, because is not clear in the official documentation - I think is wise add some scenarios to help the developer choice the best option.
Thanks for your understanding
- is related to
-
JENKINS-69264 [ssh-agent] Use SSH Host Key verification strategies from git-client-plugin
- Open