There are ways to actually have both.
But as you pointed out this is typically a stupid thing.
Reasons being sometimes an alternate authentication system needs to be defined to guarantee access to remote systems even when the primary and perhaps secondary authentication systems are unavailable.
But, given that now a days there are other ways to get access (RIB Boards, Remote KVMs etc...) this makes entirely ZERO sense.
--
[link|mailto:greg@gregfolkert.net|greg],
[link|http://www.iwethey.org/ed_curry|REMEMBER ED CURRY!] @ iwethey
'In view of the fact that Microsoft is acondemned monopolist and on the other hand the internal messages andfinancial transactions of SCO look ever doubtful, Microsoft should bereally anxious that to the own company something does not remainsticking from the Gestank of the SCO.' --Plagarized from [link|http://www.groklaw.net/article.php?story=20040322133607169|GROKLAW]