What you’re describing is essentially using a fingerprint instead of a private key or password for logging into a server via ssh.
The way this works is more akin to using a private key to login via SSH, but that private key is protected by a fingerprint instead of a password.
Ultimately the security comes from not sharing your private key, rather than the mechanism used to protect that key.
What you’re describing is essentially using a fingerprint instead of a private key or password for logging into a server via ssh.
The way this works is more akin to using a private key to login via SSH, but that private key is protected by a fingerprint instead of a password.
Ultimately the security comes from not sharing your private key, rather than the mechanism used to protect that key.