Configuring An Ssh User - HP 5920 Series Configuration Manual

Hide thumbs Also See for 5920 Series:
Table of Contents

Advertisement

Step
4.
Return to system view.
To import a client's host public key from a public key file:
Step
1.
Enter system view.
2.
Import a client's public key
from a public key file.

Configuring an SSH user

To configure an SSH user that uses publickey authentication, perform the procedure in this section.
If the authentication method is publickey, you must create an SSH user and a local user on the server. To
get the correct working directory and user role, the local user must have the same username as the SSH
user.
If the authentication method is password-publickey or any, you must create an SSH user, and configure
a local user account by using the local-user command for local authentication, or configure an SSH user
account on an authentication server, for example, a RADIUS server, for remote authentication. In either
case, the local user or the SSH user configured for remote authentication must have the same username
as the SSH user.
If the authentication method is password, you do not need to create an SSH user or local user. However,
if you want to display all SSH users, including the password-only SSH users, for centralized management,
you can use this command to create them. If such an SSH user has been created, make sure you have
specified the correct service type and authentication method.
Configuration guidelines
When you configure an SSH user, follow these restrictions and guidelines:
An SSH server supports up to 1024 SSH users.
For an SFTP or SCP user, the working directory depends on the authentication method:
If the authentication method is password, the working directory is authorized by AAA.
If the authentication method is publickey or password-publickey, the working folder is specified
by the authorization-attribute command in the associated local user view.
For an SSH user, the user role also depends on the authentication method:
If the authentication method is password, the user role is authorized by the remote AAA server
or the local device.
If the authentication method is publickey or password-publickey, the user role is specified by
the authorization-attribute command in the associated local user view.
If you change the authentication method or public key for an SSH user that has been logged in, the
change can take effect only on the user at the next login.
Except password authentication, the other authentication methods require a client's host public key
or digital certificate to be specified.
Command
peer-public-key end
Command
system-view
public-key peer keyname import sshkey filename
276
Remarks
N/A

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

5900 series

Table of Contents