Pat Moran
What is the best way to use public/private keys to authenticate user access to web resources