CHAPTER 4: OPERATIONS
23
Authenticating an SSH user
SSH is enabled and disabled with the Server SSH command. When you enable SSH,
you may specify the authentication method(s) that will be used for SSH connections.
The method may be a password, an SSH key or both. A user’s password and SSH
key are specified with a User Add or User Set command. All SSH keys must be
RSA keys. DSA keys are not supported.
The following table lists and describes the valid SSH authentication methods that
can be specified with a Server SSH command.
SSH Authentication Methods
Method Description
PW (default)
SSH connections will be authenticated with a username/
password. With this method, a user’s defi nition must
include a valid password in order for that user to
authenticate an SSH session.
KEY
SSH connections will be authenticated with an SSH key.
With this method, a user’s defi nition must include valid
SSH key information in order for that user to authenticate
an SSH session. For more information, see
SSH user keys
in this chapter.
PW|KEY or KEY|PW SSH connections will be authenticated with either a
username/password or an SSH key. If a user has only a
password defi ned, that user must authenticate an SSH
session with a username/password. If a user has only an
SSH key defi ned, that user must authenticate an SSH
session using the key. If a user has both a password and
an SSH key defi ned, that user may use either a username/
password or the SSH key to authenticate an SSH session.
This method allows the SCPS administrator to defi ne how
each user will authenticate an SSH session based on
information provided in the User Add/Set command.
PW&KEY or KEY&PW SSH connections will be authenticated using both a
username/password and an SSH key. With this method,
a user’s defi nition must include a password and SSH key
information for that user to authenticate an SSH session.
A user’s access rights are determined from the authentication method used. SSH key
authentication always uses the access rights from the local user database. Depending
on the server authentication mode specified with the Server Security command, SSH
password authentication will use either the access rights from the local user database
or the values returned by the RADIUS server.
Содержание ServSelect KV119A
Страница 1: ...Doc No 590 326 001A...
Страница 80: ...NOTES 79...
Страница 81: ...NOTES 80...
Страница 82: ...NOTES 81...
Страница 83: ...NOTES 82...
Страница 84: ...Doc No 590 326 001A...