Securing the Striim server(s)
Administrators and other users should not log into the shell or other services of the operating systems hosting Striim Platform, configuration files, and scripts using usernames and passwords. Instead, the operating system should be configured to require clients to authenticate to a specific machine instance using an SSH certificate. See, for example:
Red Hat Linux: Using OpenSSH Certificate Authentication
Ubuntu: SSH/OpenSSH/Keys
Windows Server: Key-based authentication in OpenSSH for Windows