summaryrefslogtreecommitdiff
path: root/sshd_config.5
diff options
context:
space:
mode:
Diffstat (limited to 'sshd_config.5')
-rw-r--r--sshd_config.522
1 files changed, 20 insertions, 2 deletions
diff --git a/sshd_config.5 b/sshd_config.5
index 987558ae8..de8f0f825 100644
--- a/sshd_config.5
+++ b/sshd_config.5
@@ -33,8 +33,8 @@
33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 33.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35.\" 35.\"
36.\" $OpenBSD: sshd_config.5,v 1.145 2012/10/04 13:21:50 markus Exp $ 36.\" $OpenBSD: sshd_config.5,v 1.146 2012/10/30 21:29:55 djm Exp $
37.Dd $Mdocdate: October 4 2012 $ 37.Dd $Mdocdate: October 30 2012 $
38.Dt SSHD_CONFIG 5 38.Dt SSHD_CONFIG 5
39.Os 39.Os
40.Sh NAME 40.Sh NAME
@@ -151,6 +151,22 @@ See
151in 151in
152.Xr ssh_config 5 152.Xr ssh_config 5
153for more information on patterns. 153for more information on patterns.
154.It Cm AuthorizedKeysCommand
155Specifies a program to be used for lookup of the user's public keys.
156The program will be invoked with a single argument of the username
157being authenticated, and should produce on standard output zero or
158more lines of authorized_keys output (see AUTHORIZED_KEYS in
159.Xr sshd 8 )
160If a key supplied by AuthorizedKeysCommand does not successfully authenticate
161and authorize the user then public key authentication continues using the usual
162.Cm AuthorizedKeysFile
163files.
164By default, no AuthorizedKeysCommand is run.
165.It Cm AuthorizedKeysCommandUser
166Specifies the user under whose account the AuthorizedKeysCommand is run.
167The default is the user being authenticated.
168It is recommended to use a dedicated user that has no other role on the host
169than running authorized keys commands.
154.It Cm AuthorizedKeysFile 170.It Cm AuthorizedKeysFile
155Specifies the file that contains the public keys that can be used 171Specifies the file that contains the public keys that can be used
156for user authentication. 172for user authentication.
@@ -712,6 +728,8 @@ Available keywords are
712.Cm AllowTcpForwarding , 728.Cm AllowTcpForwarding ,
713.Cm AllowUsers , 729.Cm AllowUsers ,
714.Cm AuthorizedKeysFile , 730.Cm AuthorizedKeysFile ,
731.Cm AuthorizedKeysCommand ,
732.Cm AuthorizedKeysCommandUser ,
715.Cm AuthorizedPrincipalsFile , 733.Cm AuthorizedPrincipalsFile ,
716.Cm Banner , 734.Cm Banner ,
717.Cm ChrootDirectory , 735.Cm ChrootDirectory ,