Configuring An Ssh User - HP 10500 Series Configuration Manual

Security configuration guide
Hide thumbs Also See for 10500 Series:
Table of Contents

Advertisement

Step
5.
Return to public key view and
save the configured host
public key.
6.
Return to system view.
Importing a client public key from a public key file
Step
1.
Enter system view.
2.
Import the public key from a
public key file.
For more information about client public key configuration, see

Configuring an SSH user

To configure an SSH user that uses publickey authentication, you must perform the procedure in this
section.
To configure an SSH user that uses password authentication, whether together with publickey
authentication or not, you must configure a local user account by using the local-user command for local
authentication, or configure an SSH user account on an authentication server, for example, a RADIUS
server, for remote authentication. For more information about the local-user command, see Security
Command Reference.
For password-only SSH users, you do not need to perform the procedure in this section to configure them
unless you want to use the display ssh user-information command to display all SSH users, including the
password-only SSH users, for centralized management.
Configuration guidelines
When you perform the procedure in this section to configure an SSH user, follow these guidelines:
You can set the service type to Stelnet or SFTP.
You can enable one of the following authentication modes for the SSH user:
Password—The user must pass password authentication.
Publickey authentication—The user must pass publickey authentication.
Password-publickey authentication—As an SSH2.0 user, the user must pass both password and
publickey authentication. As an SSH1 user, the user must pass either password or publickey
authentication.
Any—The user can use either password authentication or publickey authentication.
Except password authentication, the other authentication methods require a client's host public key
to be specified, and the specified public key must already exist. For more information about public
keys, see
If publickey authentication, whether with password authentication or not, is used, the command
level accessible to the user is set by the user privilege level command on the user interface. If only
password authentication is used, the command level accessible to the user is authorized by AAA.
Command
public-key-code end
peer-public-key end
Command
system-view
public-key peer keyname import
sshkey filename
"Configuring a client's host public
"Managing public
key."
206
Remarks
When you exit public key code
view, the system automatically
saves the public key.
N/A
Remarks
N/A
N/A
keys."

Advertisement

Table of Contents
loading

Table of Contents