CHAPTER 4: OPERATIONS
23
Authenticating an SSH user
SSH is enabled and disabled with the Server SSH command. When you enable SSH,
you may specify the authentication method(s) that will be used for SSH connections.
The method may be a password, an SSH key or both. A user’s password and SSH
key are specified with a User Add or User Set command. All SSH keys must be
RSA keys. DSA keys are not supported.
The following table lists and describes the valid SSH authentication methods that
can be specified with a Server SSH command.
SSH Authentication Methods
Method Description
PW (default)
SSH connections will be authenticated with a username/
password. With this method, a user’s defi nition must
include a valid password in order for that user to
authenticate an SSH session.
KEY
SSH connections will be authenticated with an SSH key.
With this method, a user’s defi nition must include valid
SSH key information in order for that user to authenticate
an SSH session. For more information, see
SSH user keys
in this chapter.
PW|KEY or KEY|PW SSH connections will be authenticated with either a
username/password or an SSH key. If a user has only a
password defi ned, that user must authenticate an SSH
session with a username/password. If a user has only an
SSH key defi ned, that user must authenticate an SSH
session using the key. If a user has both a password and
an SSH key defi ned, that user may use either a username/
password or the SSH key to authenticate an SSH session.
This method allows the SCPS administrator to defi ne how
each user will authenticate an SSH session based on
information provided in the User Add/Set command.
PW&KEY or KEY&PW SSH connections will be authenticated using both a
username/password and an SSH key. With this method,
a user’s defi nition must include a password and SSH key
information for that user to authenticate an SSH session.
A user’s access rights are determined from the authentication method used. SSH key
authentication always uses the access rights from the local user database. Depending
on the server authentication mode specified with the Server Security command, SSH
password authentication will use either the access rights from the local user database
or the values returned by the RADIUS server.
Summary of Contents for ServSelect KV119A
Page 1: ...Doc No 590 326 001A...
Page 80: ...NOTES 79...
Page 81: ...NOTES 80...
Page 82: ...NOTES 81...
Page 83: ...NOTES 82...
Page 84: ...Doc No 590 326 001A...