Add scenarios to help choice the best "Host Key Verification Strategy" option

This issue is archived. You can view it, but you can't modify it. Learn more

XMLWordPrintable

    I have read the following:

    And exists the Host Key Verification Strategy option and we have available the following options:

    1. Known hosts file Verification Strategy
    2. Manually provided key Verification Strategy
    3. Manually trusted key Verification Strategy
    4. Non verifying Verification Strategy

    Well, for security reasons, the 4th can be ignored. For the three first options, when would be mandatory use one approach over the other? - for what scenario(s)? - I am posting this issue, because is not clear in the official documentation - I think is wise add some scenarios to help the developer choice the best option.

    Thanks for your understanding

          Assignee:
          Ivan Fernandez Calvo
          Reporter:
          Manuel Jordan
          Archiver:
          Jenkins Service Account

            Created:
            Updated:
            Resolved:
            Archived: