summaryrefslogtreecommitdiff
path: root/sshd_config.5
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2012-10-31 08:58:58 +1100
committerDamien Miller <djm@mindrot.org>2012-10-31 08:58:58 +1100
commit09d3e1251250dcf45e5434cd474430e4ec5e8639 (patch)
tree674ce6528821636740dce3a32ac1634b397643c9 /sshd_config.5
parent07daed505f1cd6a0beff4d060b588debcc1ca8c8 (diff)
- djm@cvs.openbsd.org 2012/10/30 21:29:55
[auth-rsa.c auth.c auth.h auth2-pubkey.c servconf.c servconf.h] [sshd.c sshd_config sshd_config.5] new sshd_config option AuthorizedKeysCommand to support fetching authorized_keys from a command in addition to (or instead of) from the filesystem. The command is run as the target server user unless another specified via a new AuthorizedKeysCommandUser option. patch originally by jchadima AT redhat.com, reworked by me; feedback and ok markus@
Diffstat (limited to 'sshd_config.5')
-rw-r--r--sshd_config.522
1 files changed, 20 insertions, 2 deletions
diff --git a/sshd_config.5 b/sshd_config.5
index 987558ae8..de8f0f825 100644
--- a/sshd_config.5
+++ b/sshd_config.5
@@ -33,8 +33,8 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: sshd_config.5,v 1.145 2012/10/04 13:21:50 markus Exp $ 36.\" $OpenBSD: sshd_config.5,v 1.146 2012/10/30 21:29:55 djm Exp $
37.Dd $Mdocdate: October 4 2012 $ 37.Dd $Mdocdate: October 30 2012 $
38.Dt SSHD_CONFIG 5 38.Dt SSHD_CONFIG 5
39.Os 39.Os
40.Sh NAME 40.Sh NAME
@@ -151,6 +151,22 @@ See
151in 151in
152.Xr ssh_config 5 152.Xr ssh_config 5
153for more information on patterns. 153for more information on patterns.
154.It Cm AuthorizedKeysCommand
155Specifies a program to be used for lookup of the user's public keys.
156The program will be invoked with a single argument of the username
157being authenticated, and should produce on standard output zero or
158more lines of authorized_keys output (see AUTHORIZED_KEYS in
159.Xr sshd 8 )
160If a key supplied by AuthorizedKeysCommand does not successfully authenticate
161and authorize the user then public key authentication continues using the usual
162.Cm AuthorizedKeysFile
163files.
164By default, no AuthorizedKeysCommand is run.
165.It Cm AuthorizedKeysCommandUser
166Specifies the user under whose account the AuthorizedKeysCommand is run.
167The default is the user being authenticated.
168It is recommended to use a dedicated user that has no other role on the host
169than running authorized keys commands.
154.It Cm AuthorizedKeysFile 170.It Cm AuthorizedKeysFile
155Specifies the file that contains the public keys that can be used 171Specifies the file that contains the public keys that can be used
156for user authentication. 172for user authentication.
@@ -712,6 +728,8 @@ Available keywords are
712.Cm AllowTcpForwarding , 728.Cm AllowTcpForwarding ,
713.Cm AllowUsers , 729.Cm AllowUsers ,
714.Cm AuthorizedKeysFile , 730.Cm AuthorizedKeysFile ,
731.Cm AuthorizedKeysCommand ,
732.Cm AuthorizedKeysCommandUser ,
715.Cm AuthorizedPrincipalsFile , 733.Cm AuthorizedPrincipalsFile ,
716.Cm Banner , 734.Cm Banner ,
717.Cm ChrootDirectory , 735.Cm ChrootDirectory ,