diff options
Diffstat (limited to 'sshd_config.5')
-rw-r--r-- | sshd_config.5 | 22 |
1 files changed, 20 insertions, 2 deletions
diff --git a/sshd_config.5 b/sshd_config.5 index 987558ae8..de8f0f825 100644 --- a/sshd_config.5 +++ b/sshd_config.5 | |||
@@ -33,8 +33,8 @@ | |||
33 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | 33 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
34 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 34 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
35 | .\" | 35 | .\" |
36 | .\" $OpenBSD: sshd_config.5,v 1.145 2012/10/04 13:21:50 markus Exp $ | 36 | .\" $OpenBSD: sshd_config.5,v 1.146 2012/10/30 21:29:55 djm Exp $ |
37 | .Dd $Mdocdate: October 4 2012 $ | 37 | .Dd $Mdocdate: October 30 2012 $ |
38 | .Dt SSHD_CONFIG 5 | 38 | .Dt SSHD_CONFIG 5 |
39 | .Os | 39 | .Os |
40 | .Sh NAME | 40 | .Sh NAME |
@@ -151,6 +151,22 @@ See | |||
151 | in | 151 | in |
152 | .Xr ssh_config 5 | 152 | .Xr ssh_config 5 |
153 | for more information on patterns. | 153 | for more information on patterns. |
154 | .It Cm AuthorizedKeysCommand | ||
155 | Specifies a program to be used for lookup of the user's public keys. | ||
156 | The program will be invoked with a single argument of the username | ||
157 | being authenticated, and should produce on standard output zero or | ||
158 | more lines of authorized_keys output (see AUTHORIZED_KEYS in | ||
159 | .Xr sshd 8 ) | ||
160 | If a key supplied by AuthorizedKeysCommand does not successfully authenticate | ||
161 | and authorize the user then public key authentication continues using the usual | ||
162 | .Cm AuthorizedKeysFile | ||
163 | files. | ||
164 | By default, no AuthorizedKeysCommand is run. | ||
165 | .It Cm AuthorizedKeysCommandUser | ||
166 | Specifies the user under whose account the AuthorizedKeysCommand is run. | ||
167 | The default is the user being authenticated. | ||
168 | It is recommended to use a dedicated user that has no other role on the host | ||
169 | than running authorized keys commands. | ||
154 | .It Cm AuthorizedKeysFile | 170 | .It Cm AuthorizedKeysFile |
155 | Specifies the file that contains the public keys that can be used | 171 | Specifies the file that contains the public keys that can be used |
156 | for user authentication. | 172 | for user authentication. |
@@ -712,6 +728,8 @@ Available keywords are | |||
712 | .Cm AllowTcpForwarding , | 728 | .Cm AllowTcpForwarding , |
713 | .Cm AllowUsers , | 729 | .Cm AllowUsers , |
714 | .Cm AuthorizedKeysFile , | 730 | .Cm AuthorizedKeysFile , |
731 | .Cm AuthorizedKeysCommand , | ||
732 | .Cm AuthorizedKeysCommandUser , | ||
715 | .Cm AuthorizedPrincipalsFile , | 733 | .Cm AuthorizedPrincipalsFile , |
716 | .Cm Banner , | 734 | .Cm Banner , |
717 | .Cm ChrootDirectory , | 735 | .Cm ChrootDirectory , |