After having successfully configured my Mac to accept an SSH login using key-based authentication, I've realized that this is a little insecure: should anyone get access to a computer with that stored ...
I am setting up password ssh logins from the master node of our Red Hat 7.2 linux cluster to all the nodes. The cluster's external dns name is pleiades.physics.wsu.edu. Internally, the master node is ...