cli

The Poetics of CLI Command Names

The Poetics of CLI Command Names

By: Carl Tashian

Naming a CLI command requires deep and careful deliberation.
Step: A New Zero Trust Swiss Army Knife from Smallstep
A better security model exists. Instead of relying on IP and MAC addresses to determine access we can cryptographically authenticate the identity of people and software making requests. It’s a simple concept, really: what matters is who or what is making a request, not where a request comes from. In short, access should be based on production identity.