SSH Tectia  
Previous Next Up [Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server >>
    Getting Started >>
    Configuration >>
        SSH Tectia Server Configuration Tool >>
            SSH Tectia Server
            General
            Network
            Encryption
            Identity
            Tunneling
            User Authentication
            Password
            Public Key
            Certificates
            CRL Caching
            RSA SecurID
            GSSAPI
            RADIUS
            Host Restrictions
            User Restrictions
            SFTP Server
            Power Users
            License
        Configuration Files >>
        Subconfigurations >>
        Auditing
    Authentication >>
    Application Tunneling >>
    Troubleshooting >>
    Configuration File Reference >>
    Command-Line Tools >>
    Log Messages >>

Public Key

On the Public Key page, you can define settings for public-key and certificate authentication.


server-publickey-10.gif
Figure : The settings for public-key authentication

Public-Key and Certificate Authentication

The following parameters can be set for public-key authentication:

  • Public-key authentication

    Select from the drop-down menu whether public-key authentication is allowed, required, or denied. The default value is Allow.

    Note: If you set both public-key authentication and password authentication as required, the users are required to complete both authentication processes before they are considered authenticated.

  • User key directory

    Specify the directory where the server looks for the user keys. The default value is the subdirectory .ssh2 under the user's profile directory.

    The following pattern strings can be used:

    • %D the user's profile directory
    • %U the user's login name

    The default user key directory is the .ssh2 directory located in the user's profile directory (%D/.ssh2).

  • Authorization file

    Specify the name of the user's authorization file. The default is authorization.

    The authorization file specifies the user keys that the user is authorized to log in with. The authorization file is a text file where the keyword Key is followed by a public-key filename:

    Key mykey1.pub
    Key mykey2.pub
    

    Note: When using certificate authentication, the user key directory and authorization settings are not used.

  • Authorized keys file

    Specifies the name of the user's authorized keys file. The file is a legacy format file containing multiple public keys so that each line holds a single public key. Keys are in the ssh1/openssh public key format. Both %SSH_ORIGINAL_COMMAND% and %SSH2_ORIGINAL_COMMAND% can be used in the authorized_keys file, see usage in the ssh2 man pages.

Previous Next Up [Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice