for operations an interlock (interface we can disable) or OAuth portal login for disabling malicious users is required.
need to investigate how the opensource client can authenticate with OAuth and be managed with user account control or have an interface we can disable if abused
interlock url should issue a key and if a valid key is not provided with the client an upload request is immediately dropped and ip logged.
for operations an interlock (interface we can disable) or OAuth portal login for disabling malicious users is required.
need to investigate how the opensource client can authenticate with OAuth and be managed with user account control or have an interface we can disable if abused
interlock url should issue a key and if a valid key is not provided with the client an upload request is immediately dropped and ip logged.