I am reading a blog proposing to use the AuthorizedKeyCommand to hook into another authentication mechanism by calling a shell script
https://blog.heckel.xyz/2015/05/04/openssh-authorizedkeyscommand-with-fingerprint/ Do I have a valid concern in thinking this might not be a prudent method of authentication ? -- --Dan