Applying authentication policy to SSH key

You can enforce an authentication rule and profile for retrieving a SSH key. For example, if you apply an authentication rule specify that users attempting to retrieve the SSH key on Saturday or Sunday, then they must meet additional authentication challenges.