Ssh User - HP E4510-48G Command Reference Manual

4510g series
Table of Contents

Advertisement

[Sysname] ssh server rekey-interval 3

ssh user

Syntax
ssh user username service-type stelnet authentication-type { password | { any |
password-publickey | publickey } assign publickey keyname }
ssh user username service-type { all | sftp } authentication-type { password | { any |
password-publickey | publickey } assign publickey keyname work-directory directory-name }
undo ssh user username
View
System view
Default Level
2: System level
Parameters
username: SSH username, a case-sensitive string of 1 to 80 characters.
service-type: Specifies the service type of an SSH user, which can be one of the following:
all: Specifies both secure Telnet and secure FTP.
sftp: Specifies the service type as secure FTP.
stelnet: Specifies the service type of secure Telnet.
authentication-type: Specifies the authentication method of an SSH user, which can be one the
following:
password: Performs password authentication.
any: Performs either password authentication or publickey authentication.
password-publickey: Specifies that SSH2 clients perform both password authentication and
publickey authentication and that SSH1 clients perform either type of authentication.
publickey: Performs publickey authentication.
assign publickey keyname: Assigns an existing public key to an SSH user. keyname indicates the
name of the client public key and is a string of 1 to 64 characters.
work-directory directory-name: Specifies the working folder for an SFTP user. directory-name
indicates the name of the working folder and is a string of 1 to 135 characters.
Description
Use the ssh user command to create an SSH user and specify the service type and authentication
method.
Use the undo ssh user command to delete an SSH user.
Note that:
For a publickey authentication user, you must configure the username and the public key on the
device. For a password authentication user, you can configure the account information on either
the device or the remote authentication server such as a RADIUS server.
If you use the ssh user command to configure a public key for a user who has already had a
public key, the new one overwrites the old one.
10-7

Advertisement

Table of Contents
loading

Table of Contents