HP 6125XLG R2306-HP 6125XLG Blade Switch Security Configuration Guide - Page 139

Configuring an SSH user, Configuration guidelines

Page 139 highlights

• Importing the host public key-You can upload the client's public key file (in binary) to the server, for example, through FTP or TFTP, and import the host public key from the public key file. During the import process, the server automatically converts the host public key in the public key file to a string in PKCS format. HP recommends that you configure no more than 20 SSH client host public keys on an SSH server. To manually configure a client's host public key: Step 1. Enter system view. 2. Enter public key view. 3. Configure a client's host public key. 4. Return to system view. Command Remarks system-view N/A public-key peer keyname N/A Enter the content of the host public key When you enter the contents for a host public key, you can use spaces and carriage returns between characters. When you save the host public key, spaces and carriage returns are removed automatically. For more information, see "Managing public keys." peer-public-key end N/A To import a client's host public key from a public key file: Step 1. Enter system view. 2. Import a client's public key from a public key file. Command system-view public-key peer keyname import sshkey filename Configuring an SSH user To configure an SSH user that uses publickey authentication, perform the procedure in this section. If the authentication method is publickey, you must create an SSH user and a local user on the server. To get the correct working directory and user role, the local user must have the same username as the SSH user. If the authentication method is password-publickey or any, you must configure a local user account by using the local-user command for local authentication, or configure an SSH user account on an authentication server, for example, a RADIUS server, for remote authentication. In either case, the local user or the SSH user configured for remote authentication must have the same username as the SSH user. If the authentication method is password, you do not need to perform the procedure in this section to configure them unless you want to use the display ssh user-information command to display all SSH users, including the password-only SSH users, for centralized management. If such an SSH user has been created, make sure you have specified the correct service type and authentication method. Configuration guidelines When you configure an SSH user, follow these guidelines: • An SSH server supports up to 1024 SSH users. 130

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276

130
Importing the host public key
—You can upload the client's public key file (in binary) to the server,
for example, through FTP or TFTP, and import the host public key from the public key file. During the
import process, the server automatically converts the host public key in the public key file to a string
in PKCS format.
HP recommends that you configure no more than 20 SSH client host public keys on an SSH server.
To manually configure a client's host public key:
Step
Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter public key view.
public-key peer
keyname
N/A
3.
Configure a client's host
public key.
Enter the content of the host public
key
When you enter the contents for a
host public key, you can use
spaces and carriage returns
between characters. When you
save the host public key, spaces
and carriage returns are removed
automatically.
For more information, see
"
Managing public keys
."
4.
Return to system view.
peer-public-key
end
N/A
To import a client's host public key from a public key file:
Step
Command
1.
Enter system view.
system-view
2.
Import a client's public key
from a public key file.
public-key peer
keyname
import sshkey
filename
Configuring an SSH user
To configure an SSH user that uses publickey authentication, perform the procedure in this section.
If the authentication method is
publickey
, you must create an SSH user and a local user on the server. To
get the correct working directory and user role, the local user must have the same username as the SSH
user.
If the authentication method is
password-publickey
or
any
, you must configure a local user account by
using the
local-user
command for local authentication, or configure an SSH user account on an
authentication server, for example, a RADIUS server, for remote authentication. In either case, the local
user or the SSH user configured for remote authentication must have the same username as the SSH user.
If the authentication method is
password
, you do not need to perform the procedure in this section to
configure them unless you want to use the
display ssh user-information
command to display all SSH
users, including the password-only SSH users, for centralized management. If such an SSH user has been
created, make sure you have specified the correct service type and authentication method.
Configuration guidelines
When you configure an SSH user, follow these guidelines:
An SSH server supports up to 1024 SSH users.