summaryrefslogtreecommitdiff
path: root/sshd_config.5
diff options
context:
space:
mode:
Diffstat (limited to 'sshd_config.5')
-rw-r--r--sshd_config.525
1 files changed, 24 insertions, 1 deletions
diff --git a/sshd_config.5 b/sshd_config.5
index 0fb0b837d..05f3374fb 100644
--- a/sshd_config.5
+++ b/sshd_config.5
@@ -33,7 +33,7 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: sshd_config.5,v 1.148 2012/11/04 10:38:43 djm Exp $ 36.\" $OpenBSD: sshd_config.5,v 1.149 2012/11/04 11:09:15 djm Exp $
37.Dd $Mdocdate: November 4 2012 $ 37.Dd $Mdocdate: November 4 2012 $
38.Dt SSHD_CONFIG 5 38.Dt SSHD_CONFIG 5
39.Os 39.Os
@@ -151,6 +151,28 @@ See
151in 151in
152.Xr ssh_config 5 152.Xr ssh_config 5
153for more information on patterns. 153for more information on patterns.
154.It Cm AuthenticationMethods
155Specifies the authentication methods that must be successfully completed
156for a user to be granted access.
157This option must be followed by one or more comma-separated lists of
158authentication method names.
159Successful authentication requires completion of every method in at least
160one of these lists.
161.Pp
162For example, an argument of
163.Dq publickey,password publickey,keyboard-interactive
164would require the user to complete public key authentication, followed by
165either password or keyboard interactive authentication.
166Only methods that are next in one or more lists are offered at each stage,
167so for this example, it would not be possible to attempt password or
168keyboard-interactive authentication before public key.
169.Pp
170This option is only available for SSH protocol 2 and will yield a fatal
171error if enabled if protocol 1 is also enabled.
172Note that each authentication method listed should also be explicitly enabled
173in the configuration.
174The default is not to require multiple authentication; successful completion
175of a single authentication method is sufficient.
154.It Cm AuthorizedKeysCommand 176.It Cm AuthorizedKeysCommand
155Specifies a program to be used to look up the user's public keys. 177Specifies a program to be used to look up the user's public keys.
156The program will be invoked with a single argument of the username 178The program will be invoked with a single argument of the username
@@ -728,6 +750,7 @@ Available keywords are
728.Cm AllowGroups , 750.Cm AllowGroups ,
729.Cm AllowTcpForwarding , 751.Cm AllowTcpForwarding ,
730.Cm AllowUsers , 752.Cm AllowUsers ,
753.Cm AuthenticationMethods ,
731.Cm AuthorizedKeysCommand , 754.Cm AuthorizedKeysCommand ,
732.Cm AuthorizedKeysCommandUser , 755.Cm AuthorizedKeysCommandUser ,
733.Cm AuthorizedKeysFile , 756.Cm AuthorizedKeysFile ,